Author of the publication

Maintaining Routing Tree in IEEE 802.16 Centralized Scheduling Mesh Networks.

, and . ICCCN, page 240-245. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated profiling of individual cell-cell interactions from high-throughput time-lapse imaging microscopy in nanowell grids (TIMING)., , , , , , , , , and . Bioinformatics, 31 (19): 3189-3197 (2015)Optimum Fair Bandwidth Allocation Scheme for IEEE 802.16 Mesh Mode with Directional Antenna., and . VTC Fall, page 1-5. IEEE, (2006)Maintaining Routing Tree in IEEE 802.16 Centralized Scheduling Mesh Networks., and . ICCCN, page 240-245. IEEE, (2007)Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information., , and . TRUST, volume 6740 of Lecture Notes in Computer Science, page 239-253. Springer, (2011)Quantitative profiling of microglia populations using harmonic co-clustering of arbor morphology measurements., , , , , and . ISBI, page 1360-1363. (2013)Improving XCP to achieve max-min fair bandwidth allocation., , and . Computer Networks, 54 (3): 442-461 (2010)To filter or to authorize: network-layer DoS defense against multimillion-node botnets., , and . SIGCOMM, page 195-206. ACM, (2008)A new approach to securing audio conference tools., , , , , and . AINTEC, page 120-123. ACM, (2011)Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud.. NDSS, The Internet Society, (2012)Towards Plugging Privacy Leaks in the Domain Name System., and . Peer-to-Peer Computing, page 1-10. IEEE, (2010)