Author of the publication

Evaluation of probing strategy for ad hoc networks over UTRA-TDD protocol.

, and . PE-WASUN, page 125-126. ACM, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deploying SIP-based Mobile Exam Application onto Next Generation Network testbed, , , and . CoRR, (2012)How to Make Business Processes "Socialize"?, , , , , and . EAI Endorsed Trans. Indust. Netw. & Intellig. Syst., 2 (5): e2 (2015)Big Data 2.0 Processing Systems: Taxonomy and Open Challenges., , , , , and . J. Grid Comput., 14 (3): 379-405 (2016)A Framework of Enriching Business Processes Life-Cycle with Tagging Information., , , and . ADC, volume 9093 of Lecture Notes in Computer Science, page 309-313. Springer, (2015)Big Graph Processing Systems: State-of-the-Art and Open Challenges., , , , and . BigDataService, page 24-33. IEEE Computer Society, (2015)Opportunistic Offloading of Deadline-Constrained Bulk Cellular Traffic in Vehicular DTNs., , , , , and . IEEE Trans. Computers, 64 (12): 3515-3527 (2015)Market-Based Sensor Relocation by Robot Team in Wireless Sensor Networks., , , and . Ad Hoc & Sensor Wireless Networks, 22 (3-4): 259-280 (2014)Cooperative schemes for path establishment in mobile ad-hoc networks under shadow-fading., , and . Ad Hoc Networks, 11 (8): 2556-2566 (2013)Adaptive technologies for hybrid ad-hoc/cellular network architecture.. IJAHUC, 8 (1/2): 16-26 (2011)Liquid Benchmarking: A Platform for Democratizing the Performance Evaluation Process., , , , , and . EDBT, page 537-540. OpenProceedings.org, (2015)