Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Spectrum Sensing and Resource Allocation for OFDM-based Transmission with a Cognitive Relay., , , and . EAI Endorsed Trans. Wirel. Spectr., 1 (1): e4 (2014)Impact of Constraints on the Complexity and Performance of Channel Assignment in Multi-Hop Wireless Networks., , , and . J. Cyber Secur. Mobil., (2012)Learning through Multimedia Interaction.. IEEE Multim., 13 (1): 84-85 (2006)Studying Energy Trade Offs in Offloading Computation/Compilation in Java-Enabled Mobile Devices., , , , , and . IEEE Trans. Parallel Distributed Syst., 15 (9): 795-809 (2004)Block-based frequency scalable technique for efficient hierarchical coding., , , and . IEEE Trans. Signal Process., 54 (7): 2559-2566 (2006)On the choice of risk optimal data embedding strategy, safe embedding rate, and passive steganalysis.. Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 590-594. SPIE, (2005)A Bayesian image steganalysis approach to estimate the embedded secret message., and . MM&Sec, page 33-38. ACM, (2005)Author gender identification from text., , and . Digit. Investig., 8 (1): 78-88 (2011)Software defined access for HetNets., , and . IEEE Commun. Mag., 54 (1): 84-89 (2016)SpiderRadio: A cognitive radio network with commodity hardware and open source software., , , and . IEEE Commun. Mag., 49 (3): 101-109 (2011)