Author of the publication

A New Approach for Selecting Aggregated Multicast Trees to Reduce Forwarding States.

, , and . NSysS, page 10-18. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

iTCP: an intelligent TCP with neural network based end-to-end congestion control for ad-hoc multi-hop wireless mesh networks., and . Wireless Networks, 21 (2): 581-610 (2015)Towards exploiting a synergy between cognitive and multi-radio networking., , and . WiMob, page 370-377. IEEE Computer Society, (2015)General-purpose multi-objective vertical hand-off mechanism exploiting network dynamics., , , , , and . WiMob, page 825-832. IEEE Computer Society, (2015)Backpacking: Deployment of Heterogeneous Radios in High Data Rate Sensor Networks., , , and . ICCCN, page 1-8. IEEE, (2011)Securing app distribution process of iOS exploiting the notion of authentic update., , and . NSysS, page 1-8. IEEE, (2016)User identification through usage analysis of electronic devices., , , , and . NSysS, page 1-6. IEEE, (2015)Stable Sensor Network (SSN): A Dynamic Clustering Technique for Maximizing Stability in Wireless Sensor Networks., , , and . Wireless Sensor Network, 2 (7): 538-554 (2010)As you are, so shall you move your head: a system-level analysis between head movements and corresponding traits and emotions., , , , , and . NSysS, page 3-11. ACM, (2019)Fault-tolerant design method for tizen applications considering core- and API-level faults., and . NSysS, page 116-121. ACM, (2019)Securing Highly-Sensitive Information in Smart Mobile Devices through Difficult-to-Mimic and Single-Time Usage Analytics., , , , and . MobiQuitous, page 322-331. ACM, (2018)