From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security threats in M2M networks: a survey with case study., , , , и . Comput. Syst. Sci. Eng., (2017)Multi-Band Multi-Hop WLANs for Disaster Relief and Public Safety Applications., , , , и . WCNC Workshops, стр. 1-6. IEEE, (2020)Interplay between Big Spectrum Data and Mobile Internet of Things: Current solutions and future challenges., , , и . Comput. Networks, (2019)Machine Learning for Resource Management in Cellular and IoT Networks: Potentials, Current Solutions, and Open Challenges., , , и . CoRR, (2019)Adaptive Switching for Efficient Energy Harvesting in Energy Constraint IoT Devices., , и . VTC Fall, стр. 1-5. IEEE, (2017)A Novel TCP/IP Header Hijacking Attack on SDN., , , , , , и . INFOCOM Workshops, стр. 1-2. IEEE, (2022)Feasibility of a Post-Auricle Wireless Power System for Pediatric Mechanical Circulatory Support Pumps., , , и . EMBC, стр. 1514-1517. IEEE, (2018)A new alarming system for an underground mining environment using visible light communications., , и . IHTC, стр. 213-217. IEEE, (2017)A Comparative Analysis of Task Scheduling Approaches in Cloud Computing., , , , , , , и . CCGRID, стр. 681-684. IEEE, (2020)Johar: a framework for developing accessible applications., и . ASSETS, стр. 243-244. ACM, (2009)