Author of the publication

An Exposed-Terminal-Eliminated Dual-Channel MAC Protocol for Exploiting Concurrent Transmissions in Multihop Wireless Networks.

, , and . TIIS, 8 (3): 778-798 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Networks Node Mining Algorithm of Based on Greedy Subgraph., , , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 157-168. Springer, (2018)A Model of Active Agent design to cope Hypertension's Emergencies situation rapidly Home healthcare., , and . IC-AI, page 225-231. CSREA Press, (2008)vRAM: Faster Verifiable RAM with Program-Independent Preprocessing., , , , and . IEEE Symposium on Security and Privacy, page 908-925. IEEE Computer Society, (2018)vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases., , , , and . IACR Cryptol. ePrint Arch., (2017)Anonymous Camera for Privacy Protection., , , and . ICPR, page 4170-4175. IEEE Computer Society, (2014)Reinforcement Learning based QoS/QoE-aware Service Function Chaining in Software-Driven 5G Slices., , , , , , and . CoRR, (2018)Streaming Authenticated Data Structures: Abstraction and Implementation., , , and . CCSW, page 129-139. ACM, (2014)IntegriDB: Verifiable SQL for Outsourced Databases., , and . ACM Conference on Computer and Communications Security, page 1480-1491. ACM, (2015)A prototype automated knowledge acquisition system., , , and . IKE, page 170-175. CSREA Press, (2008)An Exposed-Terminal-Eliminated Dual-Channel MAC Protocol for Exploiting Concurrent Transmissions in Multihop Wireless Networks., , and . TIIS, 8 (3): 778-798 (2014)