Author of the publication

An Efficient Bandwidth Management Scheme for a Hard Real-Time Fuzzy Control System Based on the Wireless LAN.

, , , , and . RSFDGrC (2), volume 3642 of Lecture Notes in Computer Science, page 644-653. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Error Control Scheme for Multicast Video Streaming on the Last Hop Wireless LANs., , , , , and . International Conference on Computational Science (4), volume 3994 of Lecture Notes in Computer Science, page 962-969. Springer, (2006)A Dual-Channel MAC Protocol Using Directional Antennas in Location Aware Ad Hoc Networks., , and . ICCSA (4), volume 3983 of Lecture Notes in Computer Science, page 594-602. Springer, (2006)Efficient Image Retrieval Using Conceptualization of Annotated Images., , , , and . MCAM, volume 4577 of Lecture Notes in Computer Science, page 426-433. Springer, (2007)Application-level task execution issues in mobile cloud computing., , , , , and . SAC, page 2285-2287. ACM, (2015)Design of a Prioritized Error Control Scheme based on Load Differentiation for Time Sensitive Traffic on the Wireless LAN., , , , and . JNW, 1 (2): 45-51 (2006)A Comparison of Elementary Students' Web Searching Behaviors according to Personality Types., , , and . FECS, page 102-107. CSREA Press, (2005)An Efficient Bandwidth Management Scheme for a Hard Real-Time Fuzzy Control System Based on the Wireless LAN., , , , and . RSFDGrC (2), volume 3642 of Lecture Notes in Computer Science, page 644-653. Springer, (2005)Path Prediction of Moving Objects on Road Networks Through Analyzing Past Trajectories., , , , , and . KES (1), volume 4692 of Lecture Notes in Computer Science, page 379-389. Springer, (2007)Analysis of Moving Patterns of Moving Objects with the Proposed Framework., , , , and . ICCSA (2), volume 5593 of Lecture Notes in Computer Science, page 443-452. Springer, (2009)An Approach to Verifying Security and Timing Properties in UML Models., , and . ICECCS, page 193-202. IEEE Computer Society, (2010)