Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Greedy construction of load-balanced virtual backbones in wireless sensor networks., , , and . Wireless Communications and Mobile Computing, 14 (7): 673-688 (2014)Constructing load-balanced virtual backbones in probabilistic wireless sensor networks via multi-objective genetic algorithm., , , , and . Trans. Emerging Telecommunications Technologies, 26 (2): 147-163 (2015)Data caching-based query processing in multi-sink wireless sensor networks., , and . IJSNet, 11 (2): 109-125 (2012)Approximation algorithms for load-balanced virtual backbone construction in wireless sensor networks., , , and . Theor. Comput. Sci., (2013)Distributed data collection and its capacity in asynchronous wireless sensor networks., and . INFOCOM, page 2113-2121. IEEE, (2012)M-cube: A Duty Cycle Based Multi-channel MAC Protocol with Multiple Channel Reservation for WSNs., , , , and . ICPADS, page 107-114. IEEE Computer Society, (2010)Routing in Multi-Sink Sensor Networks Based on Gravitational Field., , , and . ICESS, page 368-375. IEEE Computer Society, (2008)Semi-Structure Routing and Performance Analysis for Cognitive Radio Networks., , , and . MASS, page 168-172. IEEE Computer Society, (2013)Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too., , , , and . IEEE Security & Privacy, 16 (5): 49-59 (2018)V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing., , , , , , and . CoRR, (2019)