Author of the publication

Reliability analysis for chain topology wireless sensor networks with multiple-sending transmission scheme.

, , , and . EURASIP J. Wireless Comm. and Networking, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks., , , , and . MSN, page 457-464. IEEE Computer Society, (2009)Adaptive matching wavelet networks for face recognition., and . ICIP (1), page 345-348. IEEE, (2005)On Array Theory of Bounded Elements., , , and . CAV, volume 6174 of Lecture Notes in Computer Science, page 570-584. Springer, (2010)Formal Specification and Code Generation of Programable Logic Controllers., , , and . ICECCS, page 102-109. IEEE Computer Society, (2009)The Degenerate Bounded Errors-in-Variables Model., , , and . SIAM J. Matrix Analysis Applications, 23 (1): 138-166 (2001)An Algorithm to Compute Sepλ., and . SIAM J. Matrix Analysis Applications, 28 (2): 348-359 (2006)New Methods for Estimating the Distance to Uncontrollability.. SIAM J. Matrix Analysis Applications, 21 (3): 989-1003 (2000)Communication Avoiding Rank Revealing QR Factorization with Column Pivoting., , , and . SIAM J. Matrix Analysis Applications, 36 (1): 55-89 (2015)Trust Based Routing for Misbehavior Detection in Ad Hoc Networks., , , , , and . JNW, 5 (5): 551-558 (2010)Modeling job shop scheduling with batches and setup times by timed Petri nets., and . Mathematical and Computer Modelling, 49 (1-2): 286-294 (2009)