Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Content management in a mobile ad hoc network: beyond opportunistic strategy., , , and . IJCNDS, 10 (2): 123-145 (2013)Secure Incentives for Commercial Ad Dissemination in Vehicular Networks., , , and . IEEE Trans. Vehicular Technology, 61 (6): 2715-2728 (2012)SymBiosis: Anti-Censorship and Anonymous Web-Browsing Ecosystem., , and . IEEE Access, (2016)Secure incentives for commercial ad dissemination in vehicular networks., , , , and . MobiHoc, page 150-159. ACM, (2007)Towards MIMO-Aware 802.11n Rate Adaptation., , and . IEEE/ACM Trans. Netw., 21 (3): 692-705 (2013)Downlink MIMO with Frequency-Domain Packet Scheduling for 3GPP LTE., , , , and . INFOCOM, page 1269-1277. IEEE, (2009)Content management in a mobile ad hoc network: Beyond opportunistic strategy., , , and . INFOCOM, page 266-270. IEEE, (2011)Swap-Based Frequency-Domain Packet Scheduling Algorithm for Small-Queue Condition in OFDMA.. IEEE Communications Letters, 17 (5): 1028-1031 (2013)Scalable monitoring via threshold compression in a large operational 3G network., , , , , , , , and . SIGMETRICS, page 135-136. ACM, (2011)A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks., and . SASN, page 59-70. ACM, (2006)