Author of the publication

Designing fair flow fuzzy controller using genetic algorithm for computer networks.

, , , and . GEC Summit, page 361-368. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient group key management for multi-privileged groups., , , and . Computer Communications, 30 (11-12): 2497-2509 (2007)Designing energy efficient target tracking protocol with quality monitoring in wireless sensor networks., , , and . The Journal of Supercomputing, 51 (2): 131-148 (2010)Theory of (n) truth degrees of formulas in modal logic and a consistency theorem., and . Science in China Series F: Information Sciences, 52 (1): 70-83 (2009)Borel probabilistic and quantitative logic., and . SCIENCE CHINA Information Sciences, 54 (9): 1843-1854 (2011)Theory of truth degrees of propositions in the logic system Ln*., and . Science in China Series F: Information Sciences, 49 (4): 471-483 (2006)Special issue of JCSS on UbiSafe computing and communications., , , and . J. Comput. Syst. Sci., 79 (5): 515-517 (2013)Message matching-based greedy behavior detection in delay tolerant networks., and . J. Comput. Syst. Sci., 80 (5): 903-915 (2014)Building footprint extraction by fusing dual-aspect SAR images., , , and . IGARSS, page 1866-1869. IEEE, (2011)ID-Based Hierarchical Key Graph Scheme in Multi-Privileged Group Communications., , , and . GLOBECOM, page 172-176. IEEE, (2007)Special issue on trusted computing and communications., and . J. Network and Computer Applications, 35 (3): 865-866 (2012)