Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey on communication and data management issues in mobile sensor networks., , , , , and . Wireless Communications and Mobile Computing, 14 (1): 19-36 (2014)Virtual frame aggregation: Clustered channel access in wireless networks., , , , , , and . ICC, page 3497-3502. IEEE, (2015)Increasing secret key capacity of OFDM systems: a geometric program approach., , , , , and . Concurrency and Computation: Practice and Experience, (2017)Topology-Transparent Scheduling Based on Reinforcement Learning in Self-Organized Wireless Networks., , , , and . IEEE Access, (2018)Phase Timing Optimization for Smart Traffic Control Based on Fog Computing., , , and . IEEE Access, (2019)An improved parallel block Lanczos algorithm over GF(2) for integer factorization., , , , and . Inf. Sci., (2017)Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment., , , , , , , and . CoRR, (2019)Experimental identification of thermal induced warpage in polymer-metal composite films., , , and . Microelectronics Reliability, (2016)Surfing the Internet-of-Things: Lightweight Access and Control ofWireless Sensor Networks Using Industrial Low Power Protocols., , and . EAI Endorsed Trans. Indust. Netw. & Intellig. Syst., 1 (1): e2 (2014)Towards an Effective Secret Key Generation Scheme for Imperfect Channel State Information., , , , , and . Trustcom/BigDataSE/ISPA, page 915-920. IEEE, (2016)