Author of the publication

Game theoretic modeling of security and trust relationship in cyberspace.

, , and . Int. J. Communication Systems, 29 (9): 1500-1512 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Pissinou, Niki
add a person with the name Pissinou, Niki
 

Other publications of authors with the same name

A future location-aware replacement policy for the cache management at the mobile terminal., , , and . Wireless Communications and Mobile Computing, 9 (5): 607-629 (2009)Spatio-Temporal Composition of Video Objects: Representation and Querying in Video Database Systems., , , and . IEEE Trans. Knowl. Data Eng., 13 (6): 1033-1040 (2001)Using Logical Rings to Solve the Distributed Mutual Exclusion Problem with Fault Tolerance Issues., , , , and . The Journal of Supercomputing, 16 (1-2): 117-132 (2000)A future location-prediction replacement strategy for mobile computing environments., , , and . WCNC, page 2252-2260. IEEE, (2006)On Peer-to-Peer Location Management in Vehicular Ad Hoc Networks., , , , and . IJITN, 1 (2): 28-45 (2009)Spatio-Temporal Modeling in Video and Multimedia Geographic Information Systems., , and . GeoInformatica, 5 (4): 375-409 (2001)Optimal Wavelength Conversion Degree in an All-Optical Network., , and . Communications in Computing, page 176-180. CSREA Press, (2003)Joint Host-Network Optimization for Energy-Efficient Data Center Networking., , , , , , and . IPDPS, page 623-634. IEEE Computer Society, (2013)On Routing algorithms in Ad-hoc Networks., , and . International Conference on Internet Computing, page 983-990. (2002)Sketch-based data recovery in sensor data streams., , and . ICON, page 1-6. IEEE, (2013)