Author of the publication

Host-identifier-based scheme for source accountability of the internet.

, , , and . Integrated Network Management, page 539-546. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NGMIP: network-based global mobility support., , and . IJIPT, 7 (2): 96-107 (2012)Formal concept analysis approach for data extraction from a limited deep web database., , and . J. Intell. Inf. Syst., 41 (2): 211-234 (2013)An Effective Instruction Optimization Method for Embedded Real-Time Java Processor., , , and . ICPP Workshops, page 225-231. IEEE Computer Society, (2005)Asymptotical synchronization for a class of coupled time-delay partial differential systems via boundary control., , , and . Neurocomputing, (2016)A class of Petri nets for manufacturing system integration., , and . IEEE Trans. Robotics and Automation, 13 (3): 317-326 (1997)Asymptotic and Non-Asymptotic Analysis of Uplink Sum Rate for Relay-Assisted MIMO Cellular Systems., , , and . IEEE Trans. Signal Processing, 62 (6): 1348-1360 (2014)Adaptive relaying for full-duplex energy harvesting enabled cooperative communication in harsh environments., , , , and . MILCOM, page 85-90. IEEE, (2016)Finite-time stability of impulsive reaction-diffusion systems with and without time delay., , , , and . Applied Mathematics and Computation, (2019)Classification and Reconstruction of High-Dimensional Signals From Low-Dimensional Features in the Presence of Side Information., , , , , , , and . IEEE Trans. Information Theory, 62 (11): 6459-6492 (2016)Against Spyware Using CAPTCHA in Graphical Password Scheme., , , , , and . CoRR, (2013)