From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Algebraic System for Deadlock Detection and its Applications., , и . Symposium on Reliability in Distributed Software and Database Systems, стр. 177-184. IEEE Computer Society, (1984)A k-Round Elimination Contention Scheme for WLANs., , и . IEEE Trans. Mob. Comput., 6 (11): 1230-1244 (2007)A Cross-Layer Route Discovery Framework for Mobile Ad Hoc Networks., , , , и . EURASIP J. Wireless Comm. and Networking, 2005 (5): 645-660 (2005)A Cross-Layer Architecture for DiffServ in Mobile Ad-hoc Networks, , и . стр. 513-522. (2005)PCBA: A Priority-Based Competitive Broadcasting Algorithm in Mobile Ad Hoc Networks., , , и . J. Comput. Sci. Technol., 18 (5): 598-606 (2003)The Research on the Modeling Transformation from GBMS to jBPM., и . CSSE (2), стр. 485-490. IEEE Computer Society, (2008)978-0-7695-3336-0.A Trust Management Framework for Detecting Malicious and Selfish Behaviour in Ad-Hoc Wireless Networks Using Fuzzy Sets and Grey Theory., , и . IFIPTM, том 358 из IFIP Advances in Information and Communication Technology, стр. 277-289. Springer, (2011)Research on Enterprise Modeling of Agile Manufacturing., , и . EDCIS, том 2480 из Lecture Notes in Computer Science, стр. 247-256. Springer, (2002)Software Research and Development in China.. IEEE Softw., 6 (2): 53-55 (1989)A Distributed Contention Vector Division Multiple Access (D-CVDMA) Protocol for Wireless Networks., и . IEEE Trans. Mob. Comput., 9 (7): 1049-1054 (2010)