2024
Enhancing Covert Secrecy Rate in a Zero-Forcing UAV Jammer-Assisted Covert Communication.
IEEE Wirel. Commun. Lett., December, 2024
Mobile Phone Use Driver Distraction Detection Based on MSaE of Multi-Modality Physiological Signals.
IEEE Trans. Intell. Transp. Syst., November, 2024
Joint Active and Passive Beamforming for Vehicle Localization With Reconfigurable Intelligent Surfaces.
IEEE Trans. Intell. Transp. Syst., November, 2024
AoI-Aware Waveform Design for Cooperative Joint Radar-Communications Systems With Online Prediction of Radar Target Property.
IEEE Trans. Commun., October, 2024
Safe DQN-Based AoI-Minimal Task Offloading for UAV-Aided Edge Computing System.
IEEE Internet Things J., October, 2024
Energy-Efficient and Privacy-Preserved Incentive Mechanism for Mobile Edge Computing-Assisted Federated Learning in Healthcare System.
IEEE Trans. Netw. Serv. Manag., August, 2024
Reconfiguration of Cognitive Control Networks During a Long-Duration Flanker Task.
IEEE Trans. Cogn. Dev. Syst., August, 2024
Enhanced Physical Layer Security for Full-Duplex Symbiotic Radio With AN Generation and Forward Noise Suppression.
IEEE Trans. Commun., July, 2024
Blockchain-Based Resource Trading in Multi-UAV Edge Computing System.
IEEE Internet Things J., June, 2024
AoI-Energy Tradeoff for Data Collection in UAV-Assisted Wireless Networks.
IEEE Trans. Commun., March, 2024
UAV-IRS Assisted Covert Communication: Introducing Uncertainty via Phase Shifting.
IEEE Wirel. Commun. Lett., January, 2024
Importance-aware data selection and resource allocation for hierarchical federated edge learning.
Future Gener. Comput. Syst., 2024
Split Federated Learning Empowered Vehicular Edge Intelligence: Adaptive Parellel Design and Future Directions.
CoRR, 2024
Adaptive and Parallel Split Federated Learning in Vehicular Edge Computing.
CoRR, 2024
Can 3GPP New Radio Non-Terrestrial Networks Meet the IMT-2020 Requirements for Satellite Radio Interface Technology?
CoRR, 2024
Predicting pathological complete response based on weakly and semi-supervised joint learning in breast cancer multi-parametric MRI.
Biomed. Signal Process. Control., 2024
Refining Cyber Situation Awareness with Honeypots in Case of a Ransomware Attack.
Proceedings of the Good Practices and New Perspectives in Information Systems and Technologies, 2024
Generative Diffusion Model-Based Deep Reinforcement Learning for Uplink Rate-Splitting Multiple Access in LEO Satellite Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Channel Stacking: A Rapid Classification Method for Parkinson's Disease Based on EEG Data.
Proceedings of the 46th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2024
2023
Joint Optimization of Sensing and Computation for Status Update in Mobile Edge Computing Systems.
IEEE Trans. Wirel. Commun., November, 2023
Ensemble deep clustering analysis for time window determination of event-related potentials.
Biomed. Signal Process. Control., September, 2023
Robust Beamforming Design for RIS-Aided Integrated Sensing and Communication System.
IEEE Trans. Intell. Transp. Syst., June, 2023
UAV-Aided Secure Short-Packet Data Collection and Transmission.
IEEE Trans. Commun., April, 2023
Energy Efficient Resource Allocation for Wireless Powered UAV Wireless Communication System With Short Packet.
IEEE Trans. Green Commun. Netw., March, 2023
On Attacking Future 5G Networks with Adversarial Examples: Survey.
Network, 2023
Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research.
CoRR, 2023
Towards a Unified Cybersecurity Testing Lab for Satellite, Aerospace, Avionics, Maritime, Drone (SAAMD) technologies and communications.
CoRR, 2023
Satellite-Assisted Multi-Connectivity in Beyond 5G.
Proceedings of the 24th IEEE International Symposium on a World of Wireless, 2023
On Enhancing Reliability in B5G NTNs with Packet Duplication via Multi-Connectivity.
Proceedings of the IEEE International Conference on Wireless for Space and Extreme Environments, 2023
Towards a Unified Cybersecurity Testing Lab for Satellite, Aerospace, Avionics, Maritime, Drone (SAAMD) technologies and communications.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023
Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023
Computation Offloading and Resource Allocation for Digital Twin-empowered Mobile Edge Computing.
Proceedings of the 19th International Symposium on Wireless Communication Systems, 2023
IRS-Based Secure UAV-Assisted Transmission with Location and Phase Shifting Optimization.
Proceedings of the IEEE International Conference on Communications, 2023
Driver Distraction Detection Based on EEG Feature Fusion Using Random Forest.
Proceedings of the 2023 8th International Conference on Biomedical Imaging, 2023
Optimizing Waveform Power Allocation in Cognitive DFRC Systems: An Individual User AoI Preference-Based Approach.
Proceedings of the IEEE Global Communications Conference, 2023
Joint Optimization of Sensing and Communication for Digital Twin Edge Networks.
Proceedings of the IEEE Global Communications Conference, 2023
Predicting pathological complete response based on weakly and semi-supervised joint learning from breast cancer MRI.
Proceedings of the 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2023
Linearity-based Sensor Data Online Compression Methods for Environmental Applications.
Proceedings of the 6th Conference on Cloud and Internet of Things, 2023
Offensive Machine Learning Methods and the Cyber Kill Chain.
Proceedings of the Artificial Intelligence and Cybersecurity: Theory and Applications, 2023
Defensive Machine Learning Methods and the Cyber Defence Chain.
Proceedings of the Artificial Intelligence and Cybersecurity: Theory and Applications, 2023
Differential Privacy: An Umbrella Review.
Proceedings of the Artificial Intelligence and Cybersecurity: Theory and Applications, 2023
2022
Driver Distraction Detection Using Bidirectional Long Short-Term Network Based on Multiscale Entropy of EEG.
IEEE Trans. Intell. Transp. Syst., 2022
Exploring Oscillatory Dysconnectivity Networks in Major Depression During Resting State Using Coupled Tensor Decomposition.
IEEE Trans. Biomed. Eng., 2022
An Efficient and Privacy-Preserving Blockchain-Based Authentication Scheme for Low Earth Orbit Satellite-Assisted Internet of Things.
IEEE Trans. Aerosp. Electron. Syst., 2022
Cybersecurity Attacks on Software Logic and Error Handling Within ADS-B Implementations: Systematic Testing of Resilience and Countermeasures.
IEEE Trans. Aerosp. Electron. Syst., 2022
Cross-Subject Emotion Recognition Using Fused Entropy Features of EEG.
Entropy, 2022
CCTV-Exposure: An open-source system for measuring user's privacy exposure to mapped CCTV cameras based on geo-location (Extended Version).
CoRR, 2022
On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples.
IEEE Access, 2022
GDL90fuzz: Fuzzing - GDL-90 Data Interface Specification Within Aviation Software and Avionics Devices-A Cybersecurity Pentesting Perspective.
IEEE Access, 2022
On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems-An Attacker Perspective on the Availability of ADS-B Safety- and Mission-Critical Systems.
IEEE Access, 2022
Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience.
IEEE Access, 2022
On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication.
IEEE Access, 2022
A Survey on Technologies Which Make Bitcoin Greener or More Justified.
IEEE Access, 2022
Modelling Medical Devices with Honeypots: A Conceptual Framework.
Proceedings of the Information Systems and Technologies, 2022
AoI-Aware Spectrum and Power Allocation for High-Speed Railway Networks.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022
Joint Subcarrier and Phase Shifts Optimization for RIS-aided Localization-Communication System.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022
CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applications.
Proceedings of the IEEE International Conference on Trust, 2022
CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications.
Proceedings of the IEEE International Conference on Trust, 2022
Communication-Efficient Federated Learning in Channel Constrained Internet of Things.
Proceedings of the IEEE Global Communications Conference, 2022
Energy-Efficient Secure Data Collection and Transmission via UAV.
Proceedings of the IEEE Global Communications Conference, 2022
Black-box Adversarial Examples against Intelligent Beamforming in 5G Networks.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2022
CCTV-Exposure: System for Measuring User's Privacy Exposure to CCTV Cameras.
Proceedings of the Business Modeling and Software Design - 12th International Symposium, 2022
OSRM-CCTV: CCTV-Aware Routing and Navigation System for Privacy and Safety.
Proceedings of the Business Modeling and Software Design - 12th International Symposium, 2022
Age of Information in a SWIPT and URLLC enabled Wireless Communications System.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2022
2021
Resource Allocation and Computation Offloading for Multi-Access Edge Computing With Fronthaul and Backhaul Constraints.
IEEE Trans. Veh. Technol., 2021
OSRM-CCTV: Open-source CCTV-aware routing and navigation system for privacy, anonymity and safety (Preprint).
CoRR, 2021
A Statistical Model of Spine Shape and Material for Population-Oriented Biomechanical Simulation.
IEEE Access, 2021
Multi-Antenna Covert Communication With Jamming in the Presence of a Mobile Warden.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021
Curious SDN for network attack mitigation.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Intelligent IDS Chaining for Network Attack Mitigation in SDN.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
LoRa-Based Sensor Node Energy Consumption with Data Compression.
Proceedings of the IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2021
Resource Allocation for Multi-Access Edge Computing with Fronthaul and Backhaul Constraints.
Proceedings of the 17th International Symposium on Wireless Communication Systems, 2021
Energy Efficient Optimization for Solar-Powered UAV Communications System.
Proceedings of the IEEE International Conference on Communications Workshops, 2021
A model of Cyber Threat Information Sharing with the Novel Network Topology.
Proceedings of the IAIT 2021: The 12th International Conference on Advances in Information Technology, Bangkok, Thailand, 29 June 2021, 2021
Alpha Band Dysconnectivity Networks in Major Depression during Resting State.
Proceedings of the 29th European Signal Processing Conference, 2021
Joint User Association and Dynamic Beam Operation for High Latitude Muti-beam LEO Satellites.
Proceedings of the 26th IEEE Asia-Pacific Conference on Communications, 2021
2020
Incentive Mechanism for Resource Allocation in Wireless Virtualized Networks with Multiple Infrastructure Providers.
IEEE Trans. Mob. Comput., 2020
Towards large-scale, automated, accurate detection of CCTV camera objects using computer vision. Applications and implications for privacy, safety, and cybersecurity. (Preprint).
CoRR, 2020
Factors affecting Nigerian teacher educators' technology integration: Considering characteristics, knowledge constructs, ICT practices and beliefs.
Comput. Educ., 2020
Sensor Data Stream on-line Compression with Linearity-based Methods.
Proceedings of the IEEE International Conference on Smart Computing, 2020
Reinforcement Learning for Attack Mitigation in SDN-enabled Networks.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for Executable Binary Files and Object Code.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Linear Approximation Based Compression Algorithms Efficiency to Compress Environmental Data Sets.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
2019
Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequences.
CoRR, 2019
Predictive pumping based on sensor data and weather forecast.
Proceedings of the IEEE Sensors Applications Symposium, 2019
Compression Methods for Microclimate Data Based on Linear Approximation of Sensor Data.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019
Network Anomaly Detection in Wireless Sensor Networks: A Review.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019
Deep in the Dark: A Novel Threat Detection System using Darknet Traffic.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Revealing community structures by ensemble clustering using group diffusion.
Inf. Fusion, 2018
On optimal deployment of low power nodes for high frequency next generation wireless systems.
Comput. Networks, 2018
On Artificial Intelligent Malware Tolerant Networking for IoT.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2018
Requirements for Energy Efficient Edge Computing: A Survey.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2018
State of the Art Literature Review on Network Anomaly Detection.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2018
State of the Art Literature Review on Network Anomaly Detection with Deep Learning.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2018
A contract-based resource allocation mechanism in wireless virtualized network.
Proceedings of the IEEE INFOCOM 2018, 2018
A Network-Based Framework for Mobile Threat Detection.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
MLSPD - Machine Learning Based Spam and Phishing Detection.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018
A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018
Operator Revenue Analysis for Device-to-Device Communications Overlaying Cellular Network.
Proceedings of the 2018 IEEE Conference on Standards for Communications and Networking, 2018
2017
Double Auction Based Multi-Flow Transmission in Software-Defined and Virtualized Wireless Networks.
IEEE Trans. Wirel. Commun., 2017
Towards proactive context-aware self-healing for 5G networks.
Comput. Networks, 2017
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks.
Proceedings of the Network and System Security - 11th International Conference, 2017
On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2017
DNS Tunneling Detection Techniques - Classification, and Theoretical Comparison in Case of a Real APT Campaign.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2017
Performance Evaluation of OpenFlow Enabled Commodity and Raspberry pi Wireless Routers.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2017
Anomaly detection approach to keystroke dynamics based user authentication.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
Multi-hop relays for high frequency next generation wireless systems.
Proceedings of the 24th International Conference on Telecommunications, 2017
Evaluation of ensemble machine learning methods in mobile threat detection.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Cybersecurity Safeguards for the Automotive Emergency Response Vehicles.
Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2017
Simulation and performance analysis of frame structures for multi-hop relay systems.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2017
Security Assessment of a Distributed, Modbus-Based Building Automation System.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017
A Novel Model for Cybersecurity Economics and Analysis.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017
2016
Blind source separation based interference suppression schemes for OFDM and DS-CDMA.
Telecommun. Syst., 2016
Reverse Combinatorial Auction Based Resource Allocation in Heterogeneous Software Defined Network with Infrastructure Sharing.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016
A double auction mechanism for virtual resource allocation in SDN-based cellular network.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016
On optimal placement of low power nodes for improved performance in heterogeneous networks.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2016
Survey: Intrusion Detection Systems in Encrypted Traffic.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2016
Probabilistic group dependence approach for discovering overlapping clusters.
Proceedings of the 26th IEEE International Workshop on Machine Learning for Signal Processing, 2016
On adaptive access and relay link resource allocation for in-band deployments.
Proceedings of the International Symposium on Wireless Communication Systems, 2016
Distributed GNSS-based Time Synchronization and applications.
Proceedings of the 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2016
Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic.
Proceedings of the 23rd International Conference on Telecommunications, 2016
Model for sharing the information of cyber security situation awareness between organizations.
Proceedings of the 23rd International Conference on Telecommunications, 2016
Machine learning classification model for Network based Intrusion Detection System.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
2015
Online anomaly detection using dimensionality reduction techniques for HTTP log analysis.
Comput. Networks, 2015
Performance comparison of retransmission mechanisms for multi-hop relay networks.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015
Online detection of anomalous network flows with soft clustering.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015
Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015
Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015
On the system level performance of cellular FBMC-based wideband PMR network.
Proceedings of the 2015 International Symposium on Wireless Communication Systems (ISWCS), 2015
Energy efficient resource allocation in heterogeneous software defined network: A reverse combinatorial auction approach.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
2014
Always Best Connected Heterogeneous Network Concept.
Wirel. Pers. Commun., 2014
An Efficient Network Log Anomaly Detection System Using Random Projection Dimensionality Reduction.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
On optimal relay placement for improved performance in non-coverage limited scenarios.
Proceedings of the 17th ACM International Conference on Modeling, 2014
Wind Turbine Sensor Data Analysis and Production Forecast.
Proceedings of the 2014 European Modelling Symposium, Pisa, Italy, October 21-23, 2014, 2014
Variable group selection based on regression trees: Paper machine case study.
Proceedings of the 2014 IEEE Conference on Evolving and Adaptive Intelligent Systems, 2014
Analysis of HTTP Requests for Anomaly Detection of Web Attacks.
Proceedings of the IEEE 12th International Conference on Dependable, 2014
Detection of zero-day malware based on the analysis of opcode sequences.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
2013
Blind Principles Based Interference and Noise Reduction Schemes for OFDM.
Wirel. Pers. Commun., 2013
An uncertain optimal control model with Hurwicz criterion.
Appl. Math. Comput., 2013
Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2013
Proxy Mobile IPv6-Based Seamless Handover.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2013
A real time unsupervised NIDS for detecting unknown and encrypted network attacks in high speed network.
Proceedings of the 2nd IEEE International Workshop on Measurements & Networking, 2013
Information-theoretic approach to variable selection in predictive models applied to paper machine data.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013
Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013
Interference Cancellation Schemes for Spread Spectrum Systems with Blind Principles.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
2012
Blind source separation for OFDM with filtering colored noise and jamming signal.
J. Commun. Networks, 2012
Signal detection for spread spectrum communication systems with gradient algorithm.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012
Computationally efficient modulation of well-localised signals for OFDM.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012
Growing Hierarchical Self-organising Maps for Online Anomaly Detection by using Network Logs.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012
Growing Hierarchical Self-organizing Maps and Statistical Distribution Models for Online Detection of Web Attacks.
Proceedings of the Web Information Systems and Technologies - 8th International Conference, 2012
Context and location aware always-best-connected concept for heterogeneous network.
Proceedings of the IFIP Wireless Days Conference 2012, Ireland, November 21-23, 2012, 2012
A Relay Deployment Mechanism for One Scenario of Cost-Effective Coverage Extension in IEEE 802.16j Networks.
Proceedings of the 5th International Conference on New Technologies, 2012
Performance of OFDM with Blind Interference Suppression Schemes.
Proceedings of the 5th International Conference on New Technologies, 2012
Real-Life Performance Analysis of Always-Best-Connected Network.
Proceedings of the 5th International Conference on New Technologies, 2012
Power Consumption Analysis of the Always-Best-Connected User Equipment.
Proceedings of the 5th International Conference on New Technologies, 2012
VoiP performance analysis in IEEE802.16 networks.
Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, 2012
Online anomaly detection by using N-gram model and growing hierarchical self-organizing maps.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012
Efficient Handovers for Machine-to-Machine Communications between IEEE 802.11 and 3GPP Evolved Packed Core Networks.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012
2011
WINSE: WiMAX NS-2 extension.
Simul., 2011
Blind source separation for OFDM with filtering colored noise out.
Proceedings of the 2011 IEEE Swedish Communication Technologies Workshop, 2011
Better Performance of Mobile Devices in Time Frequency Dispersive Channels Using Well-Localized Bases.
Proceedings of the Smart Spaces and Next Generation Wired/Wireless Networking, 2011
Optimal Relays Deployment for 802.16j Networks.
Proceedings of the Mobile Networks and Management - Third International ICST Conference, 2011
User-centric approach to always-best-connected networks.
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011
2010
Efficient WH-OFTDM signals processing.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2010
Registration performance comparison between IP Multimedia Subsystem and Session Initiation Protocol networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2010
2009
WINSE: WiMAX NS-2 extension.
Proceedings of the 2nd International Conference on Simulation Tools and Techniques for Communications, 2009
State of Host-Centric Multihoming in IP Networks.
Proceedings of the NTMS 2009, 2009
Multiple Interface Management of Multihomed Mobile Hosts in Heterogeneous Wireless Environments.
Proceedings of the Eighth International Conference on Networks, 2009
2008
Scheduling solution for the IEEE 802.16 base station.
Comput. Networks, 2008
Gradient scheduling algorithm for fair delay guarantee in logarithmic pricing scenario.
Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, 2008
On ARQ feedback intensity of the IEEE 802.16 ARQ mechanism.
Proceedings of the 2008 International Conference on Telecommunications, 2008
XML Based 3G/LTE Network and Service Management Concept.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008
ARQ Aware Scheduling for the IEEE 802.16 Base Station.
Proceedings of IEEE International Conference on Communications, 2008
2007
Adaptive Contention Resolution for VoIP Services in the IEEE 802.16 Networks.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Adaptive contention resolution parameters for the IEEE 802.16 networks.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007
Performance Evaluation of the IEEE 802.16 ARQ Mechanism.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007
On Contention Resolution Parameters for the IEEE 802.16 Base Station.
Proceedings of the Global Communications Conference, 2007
2006
Simulation Study on 3G and WLAN Inter-Working.
IEICE Trans. Commun., 2006
Flow-based fast handover for mobile IPv6 environment - implementation and analysis.
Comput. Commun., 2006
Comparison and analysis of the revenue-based adaptive queuing models.
Comput. Networks, 2006
Analysis and Simulation of the Signaling Protocols for the DiffServ Framework.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006
Ensuring the QoS requirements in 802.16 scheduling.
Proceedings of the 9th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2006
Multicast access control concept for xDSL-customers.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006
Adaptive Algorithm for Revenue Maximization in WFQ Scheduler.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Bandwidth allocation and pricing in multimode network.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Security Analysis of Flow-based Fast Handover Method for Mobile IPv6 Networks.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Network and System Performance Management for Next Generation Networks.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Providing QOS in 3G-WLAN environment with RSVP and DIFFSERV.
Proceedings of the e-Business and Telecommunication Networks, 2006
2005
Revenue-Based Adaptive Deficit Round Robin.
Proceedings of the Quality of Service in Multiservice IP Networks, 2005
Using link layer information for improving vertical handovers.
Proceedings of the IEEE 16th International Symposium on Personal, 2005
Bandwidth allocation, bit rate and pricing.
Proceedings of IEEE International Conference on Communications, 2005
Packet scheduling with revenue optimization and weighted delay minimization.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
2004
QoS- and revenue aware adaptive scheduling algorithm.
J. Commun. Networks, 2004
Soft handover and routing mechanisms for mobile devices.
Proceedings of the IEEE 15th International Symposium on Personal, 2004
Revenue-Aware Resource Allocation in the Future Multi-Service IP Networks.
Proceedings of the Network Control and Engineering for QoS, Security and Mobility, III, 2004
Stochastic analysis of upper delay bound of GPS-based packetized fair queueing algorithms.
Proceedings of the 12th IEEE International Conference on Networks, 2004
Adaptive scheduling using the revenue-based weighted round robin.
Proceedings of the 12th IEEE International Conference on Networks, 2004
Extension of the QoS policy information model to support adaptive queuing techniques.
Proceedings of the 12th IEEE International Conference on Networks, 2004
Multicast admission control in DiffServ networks.
Proceedings of the 12th IEEE International Conference on Networks, 2004
Packet Scheduling for Maximizing Revenue in a Network Node.
Proceedings of the ICETE 2004, 2004
Providing QoS in 3G-WLAN Environment with RSVP and Diffserv.
Proceedings of the ICETE 2004, 2004
Packet Scheduling Algorithm with Weight Optimization.
Proceedings of the ICETE 2004, 2004
An Analysis of the Flow-Based Fast Handover Method for Mobile IPv6 Network.
Proceedings of the ICETE 2004, 2004
Mobility Support and Soft Handover Protocol for IP-Networks.
Proceedings of the ICETE 2004, 2004
2003
Providing QoS at the integrated WLAN and 3G environments.
Proceedings of the IEEE 14th International Symposium on Personal, 2003
Providing QoS with wireless adaptive scheduling in linear pricing scenario.
Proceedings of the IEEE 14th International Symposium on Personal, 2003
3G and WLAN Interworking QoS solution.
Proceedings of the Mobile and Wireless Communications Networks, 2003
An Adaptive Approach to WFQ with the Revenue Criterion.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
A Lightpath Allocation Scheme for WDM Networks with QoS.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Enhancing Revenue Maximization with Adaptive WRR.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Service management model for integrated 3/4G and wireless LANs.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003
QoS- and revenue aware adaptive scheduling algorithm.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003
Adaptive weighted fair scheduling method for channel allocation.
Proceedings of IEEE International Conference on Communications, 2003
2002
Optimal link allocation and revenue maximization.
J. Commun. Networks, 2002
Pricing model for 3G/4G networks.
Proceedings of the 13th IEEE International Symposium on Personal, 2002
Performance Simulations of a QoS Aware Caching Method.
Proceedings of the NETWORKING 2002, 2002
A New Mechanism for Supporting Differentiated Services in Cluster-Based Network Servers.
Proceedings of the 10th International Workshop on Modeling, 2002
Link allocation and revenue optimization for future networks.
Proceedings of the Global Telecommunications Conference, 2002
2001
Tuning of QoS Aware Load Balancing Algorithm (QoS-LB) for Highly Loaded Server Clusters.
Proceedings of the Networking, 2001
Method for improving cache hit-rates in QoS-aware load balancing algorithm (QoS-LB).
Proceedings of the Global Telecommunications Conference, 2001
QoS aware adaptive pricing for network services.
Proceedings of the Global Telecommunications Conference, 2001
1999
Delay Performance Measurements in Multimedia Switching.
Proceedings of the 25th EUROMICRO '99 Conference, 1999