Author of the publication

A Cognitive Radio MAC protocol for exploiting bandwidth utilization in wireless networks.

, , , , and . IWCMC, page 1774-1779. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Task migration in n-dimensional wormhole-routed mesh multicomputers., , and . Journal of Systems Architecture, 50 (4): 177-192 (2004)Adaptive role switching protocol for improving scatternet performance in Bluetooth radio networks., and . IEEE Trans. Consumer Electronics, 52 (4): 1229-1238 (2006)A generalized fault-tolerant sorting algorithm on a product network., , , and . Journal of Systems Architecture, 51 (3): 185-205 (2005)Efficient Address Generation for Affine Subscripts in Data-Parallel Programs., , and . The Journal of Supercomputing, 17 (2): 205-227 (2000)Synthesizing Nested Loop Algorithms Using Nonlinear Transformation Method., and . IEEE Trans. Parallel Distrib. Syst., 2 (3): 304-317 (1991)Energy-aware node placement, topology control and MAC scheduling for wireless sensor networks., and . Computer Networks, 52 (11): 2189-2204 (2008)Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system., , , and . J. Network and Computer Applications, 30 (2): 728-749 (2007)BlueCube: Constructing a Hypercube Parallel Computing and Communication Environment over Bluetooth Radio System., , and . ICPP, page 447-454. IEEE Computer Society, (2003)Patrolling Mechanisms for Disconnected Targets in Wireless Mobile Data Mules Networks., , , and . ICPP, page 93-98. IEEE Computer Society, (2011)An energy-balanced swept-coverage mechanism for mobile WSNs., , , and . Wireless Networks, 19 (5): 871-889 (2013)