Author of the publication

Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks.

, , , , , , and . SAFECOMP, volume 8666 of Lecture Notes in Computer Science, page 214-229. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing Disjunctive Ordered Logic., , and . APPIA-GULP-PRODE, page 283-294. (1996)Multiagent Compromises and Joint Fixpoint Semantics.. APPIA-GULP-PRODE, page 180-192. (2003)A non-deterministic semantics for ordered logic programs., , and . GULP-PRODE (1), page 449-463. (1994)Ordered Logic and its Relationships to other Logic Programming Formalisms.. GULP-PRODE, page 207-218. (1995)A Quad-Tree Based Multiresolution Approach for Two-dimensional Summary Data., , , and . SSDBM, page 127-140. IEEE Computer Society, (2003)Generating K-Anonymous Logs of People Tracing Systems in Surveilled Environments., , , and . SEBD, page 37-44. (2014)Reducing Data Stream Sliding Windows by Cyclic Tree-Like Histograms., and . PKDD, volume 3202 of Lecture Notes in Computer Science, page 75-86. Springer, (2004)Analysis of QoS in cooperative services for real time applications., , , , , , , , , and 2 other author(s). Data Knowl. Eng., 67 (3): 463-484 (2008)Binary-Tree Histograms with Tree Indices., , , and . DEXA, volume 2453 of Lecture Notes in Computer Science, page 861-870. Springer, (2002)Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks., , , , , , and . SAFECOMP, volume 8666 of Lecture Notes in Computer Science, page 214-229. Springer, (2014)