Isaac Woungang
Orcid: 0000-0003-2484-4649Affiliations:
- Toronto Metropolitan University, Canada
According to our database1,
Isaac Woungang
authored at least 255 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A network communication speedup model using multiple fungible and non-fungible paths.
Internet Things, April, 2024
J. High Speed Networks, 2024
Energy efficient random forest classifier-based secure routing for opportunistic internet of things.
Int. J. Ad Hoc Ubiquitous Comput., 2024
CoRR, 2024
Video-Language Critic: Transferable Reward Functions for Language-Conditioned Robotics.
CoRR, 2024
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024
Proceedings of the IEEE International Systems Conference, 2024
Proceedings of the IEEE International Conference on Communications Workshops, 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
Proceedings of the 8th Asia-Pacific Workshop on Networking, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
2023
Admission and Placement Policies for Latency-Compliant Secure Services in 5G Edge-Cloud System.
IEEE Syst. J., June, 2023
Resource allocation and user assignment schemes in cellular supported industrial IoT networks.
Trans. Emerg. Telecommun. Technol., June, 2023
A Resource Allocation Policy for Downlink Communication in Distributed IRS Aided Multiple-Input Single-Output Systems.
IEEE Trans. Commun., April, 2023
Multi-Agent DRL Approach for Energy-Efficient Resource Allocation in URLLC-Enabled Grant-Free NOMA Systems.
IEEE Open J. Commun. Soc., 2023
J. High Speed Networks, 2023
A hybrid channel transmission method for effective spectrum access in cognitive radio networks.
Int. J. Ad Hoc Ubiquitous Comput., 2023
Future Internet, 2023
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
An Analysis of Theoretical Network Communication Speedup Using Multiple Fungible Paths.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
Post-Quantum Based Oblivious Transfer for Authentication in Heterogeneous Internet of Everything.
Proceedings of the IEEE International Conference on Communications, 2023
Deep Q-Network Dueling-Based Opportunistic Data Transmission in Blockchain-Enabled M2M Communication.
Proceedings of the IEEE Global Communications Conference, 2023
A Model to Estimate the Minimum Data Transmission Time in IoT Networks Using Multiple Fungible Paths.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023
Proceedings of the Advanced Information Networking and Applications, 2023
Proceedings of the IEEE AFRICON 2023, Nairobi, Kenya, September 20-22, 2023, 2023
2022
IEEE Trans. Cloud Comput., 2022
PINE: Post-Quantum Based Incentive Technique for Non-Cooperating Nodes in Internet of Everything.
Sensors, 2022
Inf. Process. Manag., 2022
Internet Things, 2022
Proceedings of the Advances in Network-Based Information Systems, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Edge-Assisted Secure and Dependable Optimal Policies for the 5G Cloudified Infrastructure.
Proceedings of the IEEE International Conference on Communications, 2022
Reinforcement Learning Based Congestion Control Mechanism for Opportunistic Networks.
Proceedings of the IEEE Globecom 2022 Workshops, 2022
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022
Proceedings of the Advances in Computing, Informatics, Networking and Cybersecurity, 2022
Proceedings of the Advanced Information Networking and Applications, 2022
2021
Short-Packet Communications for MIMO NOMA Systems Over Nakagami-m Fading: BLER and Minimum Blocklength Analysis.
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Netw. Serv. Manag., 2021
Optimal Security-Aware Virtual Machine Management for Mobile Edge Computing Over 5G Networks.
IEEE Syst. J., 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
J. Internet Serv. Inf. Secur., 2021
J. High Speed Networks, 2021
Reinforcement learning-based fuzzy geocast routing protocol for opportunistic networks.
Internet Things, 2021
Random forest classifier-based safe and reliable routing for opportunistic IoT networks.
Int. J. Commun. Syst., 2021
Q-Learning-Based SCMA for Efficient Random Access in mMTC Networks With Short Packets.
Proceedings of the 32nd IEEE Annual International Symposium on Personal, 2021
Unsupervised Anomaly Detection Using a New Knowledge Graph Model for Network Activity and Events.
Proceedings of the Machine Learning for Networking - 4th International Conference, 2021
Proceedings of the ICC 2021, 2021
Learning-Based Multiplexing of Grant-Based and Grant-Free Heterogeneous Services with Short Packets.
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
Efficient Resource Allocation in SCMA-Enabled Device-to-Device Communication for 5G Networks.
IEEE Trans. Veh. Technol., 2020
J. Ambient Intell. Humaniz. Comput., 2020
Energy-Efficient Check-and-Spray Geocast Routing Protocol for Opportunistic Networks.
Inf., 2020
Policies and mechanisms for enhancing the resource management in cloud computing: a performance perspective.
Int. J. Grid Util. Comput., 2020
Int. J. Commun. Syst., 2020
Int. J. Commun. Syst., 2020
Toward Tactile Internet in Beyond 5G Era: Recent Advances, Current Issues, and Future Directions.
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the Advances in Networked-Based Information Systems, 2020
Proceedings of the International Conference on Intelligent Data Science Technologies and Applications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Optimal Security Cost for Latency-Aware Service Provisioning in Mobile Edge Computing.
Proceedings of the International Conference on Communications, 2020
Proceedings of the Advanced Information Networking and Applications, 2020
2019
Two-Tier Architecture for Spectrum Auction in SDN-Enabled Cloud Radio Access Network.
IEEE Trans. Veh. Technol., 2019
Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique.
Internet Things, 2019
Joint optimisation of radio and infrastructure resources for energy-efficient massive data storage in the mobile cloud over 5G HetNet.
IET Wirel. Sens. Syst., 2019
IET Networks, 2019
Towards Tactile Internet in Beyond 5G Era: Recent Advances, Current Issues and Future Directions.
CoRR, 2019
Proceedings of the 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication, 2019
Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative.
Proceedings of the Machine Learning for Networking, 2019
Design and Implementation of a Lightweight Authentication Framework for the Internet of Things (IoT).
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
Fetal Birth Weight Estimation in High-Risk Pregnancies Through Machine Learning Techniques.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Anonymous IoT Mutual Inter-Device Authentication Scheme Based on Incremental Counter (AIMIA-IC).
Proceedings of the 7th International Conference on Future Internet of Things and Cloud, 2019
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019
Proceedings of the Advanced Information Networking and Applications, 2019
An Efficient Data Transmission Technique for Big Video Files over HetNet in Emerging 5G Networks.
Proceedings of the Advanced Information Networking and Applications, 2019
Proceedings of the 2019 IEEE AFRICON, Accra, Ghana, September 25-27, 2019, 2019
2018
A genetic algorithm-based method for optimizing the energy consumption and performance of multiprocessor systems.
Soft Comput., 2018
IEEE Syst. J., 2018
Special Issue on security and privacy in Internet of Things and cloud computing systems.
Secur. Priv., 2018
Secur. Priv., 2018
A location Prediction-based routing scheme for opportunistic networks in an IoT scenario.
J. Parallel Distributed Comput., 2018
DEEP: Distance and encounter based energy-efficient protocol for opportunistic networks.
J. High Speed Networks, 2018
Analysis of joint parallelism in wireless and cloud domains on mobile edge computing over 5G systems.
J. Commun. Networks, 2018
J. Ambient Intell. Humaniz. Comput., 2018
On the target channel sequence selection for multiple handoffs in cognitive radio-based wireless regional area networks.
Int. J. Space Based Situated Comput., 2018
Int. J. Commun. Syst., 2018
A user-centric cooperative edge caching scheme for minimizing delay in 5G content delivery networks.
Trans. Emerg. Telecommun. Technol., 2018
Subcarriers assignment scheme for multiple secondary users in OFDMA-based IEEE 802.22 WRAN: A game theoretic approach.
Trans. Emerg. Telecommun. Technol., 2018
Energy Efficiency on Fully Cloudified Mobile Networks: Survey, Challenges, and Open Issues.
IEEE Commun. Surv. Tutorials, 2018
Proceedings of the International Conference on Learning and Optimization Algorithms: Theory and Applications, 2018
Proceedings of the 10th IEEE Latin-American Conference on Communications, 2018
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
An Energy-Efficient Location Prediction-Based Forwarding Scheme for Opportunistic Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Optimal Secondary Users Selection for Cooperative Spectrum Sensing in Cognitive Radio Networks.
Proceedings of the IEEE Globecom Workshops, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
Soft Comput., 2017
Intercloud and HetNet for Mobile Cloud Computing in 5G Systems: Design Issues, Challenges, and Optimization.
IEEE Netw., 2017
Int. J. Space Based Situated Comput., 2017
An altruism-based trust-dependent message forwarding protocol for opportunistic networks.
Int. J. Commun. Syst., 2017
Int. J. Commun. Syst., 2017
Int. J. Commun. Syst., 2017
Security threats in M2M networks: a survey with case study.
Comput. Syst. Sci. Eng., 2017
A game theoretic context-based routing protocol for opportunistic networks in an IoT scenario.
Comput. Networks, 2017
GD-CAR: A Genetic Algorithm Based Dynamic Context Aware Routing Protocol for Opportunistic Networks.
Proceedings of the Advances in Network-Based Information Systems, 2017
An Inter-device Authentication Scheme for Smart Homes Using One-Time-Password Over Infrared Channel.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Performance Assessment of Decision Tree-Based Predictive Classifiers for Risk Pregnancy Care.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Game Theoretic Analysis of Post Handoff Target Channel Sharing in Cognitive Radio Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
QoS-Aware Energy-Efficient Joint Radio Resource Management in Multi-RAT Heterogeneous Networks.
IEEE Trans. Veh. Technol., 2016
A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks.
Secur. Commun. Networks, 2016
J. Internet Serv. Inf. Secur., 2016
Int. J. Commun. Syst., 2016
Int. J. Comput. Math., 2016
Introduction to the special section on cognitive radios as next-generation wireless networks.
Comput. Electr. Eng., 2016
Node Placement in Wireless Mesh Networks: A Comparison Study of WMN-SA and WMN-PSO Simulation Systems.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016
Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Graph colouring technique for efficient channel allocation in cognitive radio networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Efficient Ubiquitous Big Data Storage Strategy for Mobile Cloud Computing over HetNet.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Investigation of Fitness Function Weight-Coefficients for Optimization in WMN-PSO Simulation System.
Proceedings of the 10th International Conference on Complex, 2016
Experimental Results of a Raspberry Pi Based Wireless Mesh Network Testbed Considering TCP and LoS Scenario.
Proceedings of the 10th International Conference on Complex, 2016
Performance Evaluation of an Ambient Intelligence Testbed for Improving Quality of Life: Evaluation Using Clustering Approach.
Proceedings of the 10th International Conference on Complex, 2016
Proceedings of the 10th International Conference on Complex, 2016
Proceedings of the 21st IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2016
A Probabilistic Encounter and Distance-based Routing Protocol for Opportunistic Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2015
An energy-efficient utility-based distributed data routing scheme for heterogenous sensor networks.
Wirel. Commun. Mob. Comput., 2015
Efficient routing based on past information to predict the future location for message passing in infrastructure-less opportunistic networks.
J. Supercomput., 2015
IEEE Syst. J., 2015
A Distributed Adaptive Admission Control Scheme for Multimedia Wireless Mesh Networks.
IEEE Syst. J., 2015
Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach.
IEEE Syst. J., 2015
Integration of Fixed and Mobile Infrastructure for Message Passing in Opportunistic Networks.
J. Networks, 2015
Authorship verification of e-mail and tweet messages applied for continuous authentication.
J. Comput. Syst. Sci., 2015
An optimizing pipeline stall reduction algorithm for power and performance on multi-core CPUs.
Hum. centric Comput. Inf. Sci., 2015
An energy-delay product study on chip multi-processors for variable stage pipelining.
Hum. centric Comput. Inf. Sci., 2015
Erratum to: An optimizing pipeline stall reduction algorithm for power and performance on multi-core CPUs.
Hum. centric Comput. Inf. Sci., 2015
A Centrality-Based ACK Forwarding Mechanism for Efficient Routing in Infrastructureless Opportunistic Networks.
Proceedings of the Internet of Things. IoT Infrastructures, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Modified Floyd-Warshall algorithm for equal cost multipath in software-defined data center.
Proceedings of the IEEE International Conference on Communication, 2015
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015
A Secure Video Deduplication Scheme in Cloud Storage Environments Using H.264 Compression.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015
An Analysis of Machine-Type-Communication on Human-Type-Communication over Wireless Communication Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Base Station Selection in M2M Communication Using Q-Learning Algorithm in LTE-A Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
E-MAnt Net: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
Ant Colony Optimization Based Sub-channel Allocation Algorithm for Small Cell HetNets.
Wirel. Pers. Commun., 2014
Wirel. Commun. Mob. Comput., 2014
Utility-driven construction of balanced data routing trees in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2014
IEEE Wirel. Commun. Lett., 2014
J. Supercomput., 2014
An analytical study of resource division and its impact on power and performance of multi-core processors.
J. Supercomput., 2014
GAER: genetic algorithm-based energy-efficient routing protocol for infrastructure-less opportunistic networks.
J. Supercomput., 2014
A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks.
Secur. Commun. Networks, 2014
Multim. Tools Appl., 2014
J. Networks, 2014
Fault tolerant, energy efficient and secure clustering scheme for mobile machine-to-machine communications.
Trans. Emerg. Telecommun. Technol., 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
An ant-swarm inspired dynamic multiresolution data dissemination protocol for wireless sensor networks.
J. Supercomput., 2013
EOBDBR: an Efficient Optimum Branching-Based Distributed Broadcast Routing protocol for wireless ad hoc networks.
Telecommun. Syst., 2013
Energy-based Performance Evaluation of Various Routing Protocols in Infrastructure-less Opportunistic Networks.
J. Internet Serv. Inf. Secur., 2013
A semi-Markov decision process-based joint call admission control for inter-RAT cell re-selection in next generation wireless networks.
Comput. Networks, 2013
Introduction to Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing.
Comput. Electr. Eng., 2013
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013
Mobility Models-Based Performance Evaluation of the History Based Prediction for Routing Protocol for Infrastructure-Less Opportunistic Networks.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013
An ant-swarm inspired energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2013
An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based Multipath.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
An Optimal Radio Access Network Selection Method for Heterogeneous Wireless Networks.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
An energy efficient, fault tolerant and secure clustering scheme for M2M communication networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013
A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks.
Proceedings of the International Conference on Computer, 2013
Proceedings of the International Conference on Computer, 2013
Proceedings of the International Conference on Computer, 2013
Proceedings of the Center for Advanced Studies on Collaborative Research, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
GAODV: A Modified AODV Against Single and Collaborative Black Hole Attacks in MANETs.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
HBPR: History Based Prediction for Routing in Infrastructure-less Opportunistic Networks.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
Performance of a Distributed Full Inversion Power Control and Base Station Assignment Scheme in a Cellular CDMA Network with Hot-spots.
Wirel. Pers. Commun., 2012
Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication.
IEEE Trans. Syst. Man Cybern. Part B, 2012
Energy-efficient tasks scheduling algorithm for real-time multiprocessor embedded systems.
J. Supercomput., 2012
Revisiting relative neighborhood graph-based broadcasting algorithms for multimedia ad hoc wireless networks.
J. Supercomput., 2012
Coding-error based defects in enterprise resource planning software: Prevention, discovery, elimination and mitigation.
J. Syst. Softw., 2012
Int. J. Commun. Syst., 2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of IEEE International Conference on Communications, 2012
MR-Chord: A scheme for enhancing Chord lookup accuracy and performance in mobile P2P network.
Proceedings of IEEE International Conference on Communications, 2012
Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Special issue on "Theory and practice of high-performance computing, communications, and security".
J. Supercomput., 2011
Special Issue On: Telecommunications Software Engineering: Emerging Methods, Models and Tools.
Math. Comput. Model., 2011
J. Netw. Comput. Appl., 2011
Clust. Comput., 2011
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Design and Implementation of a Fault Tolerant Multiple Master Cloud Computing System.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
Time Stamp-Based Algorithm for Task Scheduling in a Distributed Computing System with Multiple Master Multiple Slave Architecture.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011
2010
Telecommun. Syst., 2010
An enhanced MPR-based solution for flooding of broadcast messages in OLSR wireless ad hoc networks.
Mob. Inf. Syst., 2010
J. Syst. Softw., 2010
2009
Proceedings of the 16th IEEE International Conference on Electronics, 2009
Tarantula - A Scalable and Extensible Web Spider.
Proceedings of the KMIS 2009 - Proceedings of the International Conference on Knowledge Management and Information Sharing, Funchal, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
2008
Int. J. Commun. Syst., 2008
REEP: data-centric, energy-efficient and reliable routing protocol for wireless sensor networks.
IET Commun., 2008
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing.
Comput. Commun., 2008
Comput. Commun., 2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
2007
On the problem of capacity allocation and flow assignment in self-healing ATM networks.
Comput. Commun., 2007
J. Comput. Inf. Technol., 2007
Proceedings of the 2nd IEEE International Conference on System of Systems Engineering, 2007
Proceedings of the 2nd IEEE International Conference on System of Systems Engineering, 2007
2006
Proceedings of the International Joint Conference on Neural Networks, 2006
2004
Bounds on the minimum distances of a class of q-ary images of q<sup>m</sup>-ary irreducible cyclic codes.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004