Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contention Window Size Adjustment in Unsaturated IEEE 802.11 WLANs., and . IoTaaS, volume 246 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-10. Springer, (2017)A novel parallel algorithm for frequent pattern mining with privacy preserved in cloud computing environments., and . Int. J. Ad Hoc Ubiquitous Comput., 6 (4): 205-215 (2010)Wireless Big Data Computing in Smart Grid., , , , , , and . IEEE Wirel. Commun., 24 (2): 58-64 (2017)Guest Editorial Fog Computing for Industrial Applications., , , , and . IEEE Trans. Ind. Informatics, 14 (10): 4481-4486 (2018)Optimal Charging Control of Energy Storage and Electric Vehicle of an Individual in the Internet of Energy With Energy Trading., , , and . IEEE Trans. Ind. Informatics, 14 (6): 2570-2578 (2018)On delay constrained CAC scheme and scheduling policy for CBR traffic in IEEE 802.11e wireless LANs., , , and . Wirel. Commun. Mob. Comput., 10 (11): 1509-1520 (2010)Latency-Optimal mmWave Radio Access for V2X Supporting Next Generation Driving Use Cases., , , , , and . IEEE Access, (2019)Potential cyberterrorism via a multimedia smart phone based on a web 2.0 application via ubiquitous Wi-Fi access points and the corresponding digital forensics., , and . Multim. Syst., 17 (4): 341-349 (2011)A Collision Alleviation Scheme for IEEE 802.11p VANETs., , , and . Wireless Personal Communications, 56 (3): 371-383 (2011)The social networking investigation of metadata of forensic artifacts of a typical WeChat session under Windows., , and . Secur. Commun. Networks, 9 (18): 5698-5709 (2016)