Author of the publication

Attacking the kad network - real world evaluation and high fidelity simulation using DVN.

, , , , , , and . Security and Communication Networks, 6 (12): 1556-1575 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hybrid method using experiment design and grey relational analysis for multiple criteria decision making problems., , , and . Knowl.-Based Syst., (2013)Optimal reserve management for restructured power generating systems., , and . Rel. Eng. & Sys. Safety, 91 (7): 792-799 (2006)IP multimedia subsystem online session charging call control., , , , and . Bell Labs Technical Journal, 10 (4): 117-132 (2006)Coordinative Dynamics Analysis of a Parallel manipulator with Three grippers., , , , , and . I. J. Robotics and Automation, (2014)Optimization and Operation Scheduling for a Steel Plate yard Based on Greedy Algorithm., , and . JNW, 8 (7): 1654-1659 (2013)A Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ., and . NCA, page 59-66. IEEE Computer Society, (2005)Facility layouts based on differential evolution algorithm., , , and . ROBIO, page 1778-1783. IEEE, (2013)A Novel Substitution Judgment Method for Mobile Cloud Computing Application System Components., , , and . CloudCom, page 911-916. IEEE Computer Society, (2014)Incentive Mechanism for Uplink Interference Avoidance in Two-Tier Macro-Femto Networks., , , , , and . VTC Spring, page 1-6. IEEE, (2012)Dynamic fractional frequency reused proportional fair in time and frequency scheduling in OFDMA networks., , and . ISWCS, page 745-749. IEEE, (2011)