Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An opportunistic resource allocation approach for mixed QoS and non-QoS connections in OFDMA wireless networks., , , and . Computer Networks, 57 (13): 2615-2627 (2013)Alternate hop-and-wait channel rendezvous method for cognitive radio networks., , , and . INFOCOM, page 746-754. IEEE, (2013)S4: An SLA-aware Short-Secret-Sharing cloud storage system., , , , and . ICUFN, page 401-406. IEEE, (2015)A Dynamic Multi-Resource Management for Edge Computing., , , , and . EuCNC, page 379-383. IEEE, (2019)A GA-Based Approach for Resource Consolidation of Virtual Machines in Clouds., , , , and . ACIIDS (1), volume 8397 of Lecture Notes in Computer Science, page 342-351. Springer, (2014)A Fast Blind Rendezvous Method byAlternate Hop-and-Wait Channel Hoppingin Cognitive Radio Networks., , and . IEEE Trans. Mob. Comput., 13 (10): 2171-2184 (2014)Two-Layered Dynamic Key Management in Mobile and Long-Lived Cluster-Based Wireless Sensor Networks., , , , and . WCNC, page 4145-4150. IEEE, (2007)A Reliable IoT Data Economic System Based on Edge Computing., , , , and . PIMRC, page 1-5. IEEE, (2018)Secure dynamic routing protocols based on Cross-Layer Network Security Evaluation., , and . PIMRC, page 303-308. IEEE, (2012)Time-sensitive data dissemination in opportunistic networks., , , and . WCNC, page 2420-2425. IEEE, (2014)