Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Haqiq, Abdelkrim
add a person with the name Haqiq, Abdelkrim
 

Other publications of authors with the same name

A Stochastic Game Analysis of the Binary Exponential Backoff Algorithm with Multi-Power Diversity and Transmission Cost., , , , and . J. Math. Model. Algorithms in OR, 12 (3): 291-309 (2013)A team study of the IEEE 802.16 collision resolution protocol., , and . Wireless Days, page 1-6. IEEE, (2010)Performance Analysis of Connection Admission Control Scheme in IEEE 802.16 OFDMA Networks., , and . CoRR, (2013)An Improved UGS Scheduling with QoE Metrics in WiMAX Network., and . CoRR, (2014)Effect of the Feedback Function on the QoS in a Time Space Priority with Active Queue Management, , , and . CoRR, (2013)Security modeling and analysis of a self-cleansing intrusion tolerance technique., , and . IAS, page 111-117. IEEE, (2015)MDE Approach for the Establishment of a Service Level Agreements Monitoring by Trusted Third Party in the Cloud Computing., , , and . IJGHPC, 7 (4): 1-20 (2015)A novel power control based on a relaxed constraint in cognitive system., , and . Trans. Emerging Telecommunications Technologies, 27 (5): 745-758 (2016)An efficient pricing mechanism of random access in wireless network with self-interested mobile users., , and . WINCOM, page 1-6. IEEE, (2015)A broker framework for selecting secure cloud service provider using security risk approach., and . IJCC, 5 (3): 175-186 (2016)