Author of the publication

Exploiting the prefix information to enhance the performance of FSA-based RFID systems.

, , , , , and . Computer Communications, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Link contention-constrained scheduling and mapping of tasks and messages to a network of heterogeneous processors., and . Cluster Computing, 3 (2): 113-124 (2000)Efficient Scheduling of Arbitrary TAsk Graphs to Multiprocessors Using a Parallel Genetic Algorithm., and . J. Parallel Distrib. Comput., 47 (1): 58-77 (1997)Evolutionary Algorithms for Allocating Data in Distributed Database Systems., , , and . Distributed and Parallel Databases, 11 (1): 5-32 (2002)A New Auction Based Approach to Efficient P2P Live Streaming., and . ICPADS, page 573-580. IEEE Computer Society, (2011)Auction-Based Scheduling in Non-Cooperative Multiuser OFDM Systems., , and . VTC Spring, IEEE, (2009)Game Theoretic Peer Selection for Resilient Peer-to-Peer Media Streaming Systems., and . ICDCS, page 817-824. IEEE Computer Society, (2008)Security-Driven Heuristics and A Fast Genetic Algorithm for Trusted Grid Job Scheduling., , and . IPDPS, IEEE Computer Society, (2005)A Quantitative Comparison of Ad Hoc Routing Protocols with and without Channel Adaptation., , and . IEEE Trans. Mob. Comput., 4 (2): 111-128 (2005)Collaborative Internet Worm Containment., , , , and . IEEE Security & Privacy, 3 (3): 25-33 (2005)On the design, control, and use of a reconfigurable heterogeneous multi-core system-on-a-chip., and . IPDPS, page 1-11. IEEE, (2008)