Author of the publication

Throughput analysis of cognitive radio networks via stochastic network calculus.

, , and . WCSP, page 1-6. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey of dynamic bandwidth allocation algorithms for Ethernet Passive Optical Networks., and . Optical Switching and Networking, 6 (3): 151-162 (2009)Image Segmentation Using Ncut in the Wavelet Domain., , , and . Int. J. Image Graphics, 6 (4): 569-582 (2006)Throughput analysis of cognitive radio networks via stochastic network calculus., , and . WCSP, page 1-6. IEEE, (2014)Detecting Lasting and Abrupt Bursts in Data Streams Using Two-Layered Wavelet Tree., , , and . AICT/ICIW, page 30. IEEE Computer Society, (2006)Security Event Classification Method for Fiber-optic Perimeter Security System Based on Optimized Incremental Support Vector Machine., , , , , and . CCPR (2), volume 484 of Communications in Computer and Information Science, page 595-603. Springer, (2014)Global Deployment of Enterprise Systems in MNC: Exploring the Importance of Intercultural Social Knowledge., , and . PACIS, page 11. AISeL, (2007)Analysis of the Effect of Channel Sub-rating in Unidirectional Call Overflow Scheme for Call Admission in Hierarchical Cellular Networks., , , and . VTC Spring, page 1265-1269. IEEE, (2007)A User-Habit Property: Haunting of Users in IP Networks., , , and . IEICE Transactions, 90-D (1): 371-373 (2007)Virtual experiments for introduction of computing: Using virtual reality technology., , , and . FIE, page 1-5. IEEE Computer Society, (2015)Privacy Pal: Improving Permission Safety Awareness of Third Party Applications in Online Social Networks., , and . HPCC/CSS/ICESS, page 1268-1273. IEEE, (2015)