Author of the publication

Performance analysis of Extended Non-Overlapping Binary Exponential Backoff algorithm over IEEE 802.15.4.

, , , and . Telecommun. Syst., 55 (1): 39-46 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Content-Based Distortion Control Scheme for High-Quality Wireless Multimedia Services., , , , , and . EURASIP J. Wireless Comm. and Networking, (2008)A class of zero-padded spreading sequences for MAI cancellation in DS-CDMA systems., , , , and . VTC Fall, page 2379-2383. IEEE, (2001)Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model., and . KES (2), volume 3682 of Lecture Notes in Computer Science, page 1069-1075. Springer, (2005)Security Evaluation Targets for Enhancement of IT Systems Assurance., and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 491-498. Springer, (2005)Threat Description for Developing Security Countermeasure., , , and . PCM (1), volume 3331 of Lecture Notes in Computer Science, page 548-555. Springer, (2004)Protection Profile for Software Development Site., and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 499-507. Springer, (2005)A terrain classification method for UGV autonomous navigation based on SURF., and . URAI, page 303-306. IEEE, (2011)Design Procedure of IT Systems Security Countermeasures., and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 468-473. Springer, (2005)A Relationship Between Products Evaluation and IT Systems Assurance., and . KES (1), volume 3681 of Lecture Notes in Computer Science, page 1125-1130. Springer, (2005)Performance analysis of Extended Non-Overlapping Binary Exponential Backoff algorithm over IEEE 802.15.4., , , and . Telecommun. Syst., 55 (1): 39-46 (2014)