Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

All-to-All Broadcasting in Faulty Hypercubes., and . IEEE Trans. Computers, 46 (7): 749-755 (1997)Wormhole Routing in Faulty Mesh Networks., , and . PDPTA, CSREA Press, (2000)Improved Bluetooth Network Formation (IBNF)., , and . LCN, page 304-311. IEEE Computer Society, (2002)Region Based Features for Image Analysis and Retrieval Using Local Histogram Refinement., , , , and . FGCN (2), page 38-45. IEEE Computer Society, (2008)978-0-7695-3431-2.Black hole attack in mobile Ad Hoc networks., , and . ACM Southeast Regional Conference, page 96-97. ACM, (2004)Generalized Laplacian as Focus Measure., , , , and . ICCS (1), volume 5101 of Lecture Notes in Computer Science, page 1013-1021. Springer, (2008)Adaptive Deadlock-Free Wormhole Routing in Faulty Hypercubes.. Parallel and Distributed Computing and Systems, page 129-132. IASTED/ACTA Press, (1995)Improved Geographical Adaptive Fidelity (IGAF) in Mobile Ad Hoc Networks., , and . PDPTA, page 1874-1882. CSREA Press, (2002)A Secure Routing Using Reliable 1-Hop Broadcast in Mobile Ad Hoc Networks., and . FGIT-FGCN (2), volume 120 of Communications in Computer and Information Science, page 102-111. Springer, (2010)Fault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults., , and . IPDPS, page 633-638. IEEE Computer Society, (2000)