Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure data aggregation without persistent cryptographic operations in wireless sensor networks., , , and . Ad Hoc Networks, 5 (1): 100-111 (2007)Content-based image retrieval using fuzzy perceptual feedback., and . Multimedia Tools Appl., 32 (3): 235-251 (2007)Large-scale virtual machines provisioning in clouds: challenges and approaches., , and . Frontiers of Computer Science, 10 (1): 2-18 (2016)An Energy-Efficient Data Collection Framework for Wireless Sensor Networks by Exploiting Spatiotemporal Correlation., , and . IEEE Trans. Parallel Distrib. Syst., 18 (7): 1010-1023 (2007)Towards adaptive intrusion detection in mobile ad hoc networks., , and . GLOBECOM, page 3551-3555. IEEE, (2004)Pessimism Is Mostly the Best for the Expanding Ring Search in Wireless Networks., , and . GLOBECOM, IEEE, (2006)RAFlow: Read Ahead Accelerated I/O Flow through Multiple Virtual Layers., , , , , and . NAS, page 33-42. IEEE Computer Society, (2014)Mobile Telecom Cloud brokerage with orchestrated multi-tier resource pooling., , and . CLOUDNET, page 146-152. IEEE, (2015)Algorithms for Answering Geo-Range Query., , and . GLOBECOM, page 1-5. IEEE, (2010)A Concept Semantic Similarity Algorithm Based on Bayesian Estimation., , , and . Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, volume 209 of Studies in Computational Intelligence, Springer, (2009)