Author of the publication

Transmission power adaption scheme for improving IoV awareness exploiting: evaluation weighted matrix based on piggybacked information.

, , , , and . Computer Networks, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial., and . JCM, 2 (4): 1-2 (2007)Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks., , and . IEEE Trans. Parallel Distrib. Syst., 25 (3): 750-761 (2014)An Efficient Distributed Trust Model for Wireless Sensor Networks., , , , and . IEEE Trans. Parallel Distrib. Syst., 26 (5): 1228-1237 (2015)Software-defined networking security: pros and cons., , , and . IEEE Communications Magazine, 53 (6-Supplement): 73-79 (2015)Launching WCMC., , , and . Wireless Communications and Mobile Computing, 1 (1): 1-2 (2001)Editorial., , , and . Wireless Communications and Mobile Computing, 2 (4): 317-318 (2002)Link Sizing for Multi-Media Traffic Transported over IP., , and . Cluster Computing, 4 (4): 335-342 (2001)DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis., , , , and . IEEE/ACM Trans. Netw., 18 (4): 1234-1247 (2010)Optimal stream-based cipher feedback mode in error channel., and . GLOBECOM, page 5. IEEE, (2005)Analytically modeling pipeline paging for wireless systems., , and . GLOBECOM, page 5. IEEE, (2005)