Author of the publication

Robust Routing in Malicious Environment for Ad Hoc Networks.

, , , , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 36-47. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Refining Gaussian mixture model based on enhanced manifold learning., , , , , and . Neurocomputing, (2012)A Collaborative Environment Allowing Clinical Investigations on Integrated Biomedical Databases., , , , , , , , , and 4 other author(s). HealthGrid, volume 147 of Studies in Health Technology and Informatics, page 51-61. IOS Press, (2009)Study on aircraft engine installation system based on automated docking technology., , , and . CCECE, page 1485-1488. IEEE, (2015)Combine automatic and manual process on web service selection and composition to support QoS., , , and . CSCWD, page 459-464. IEEE, (2008)An Architecture of Process-centered Context-aware Software Development Environment., , , and . CSCWD, page 426-430. IEEE, (2006)Numerical Simulation on Electro-Osmotic-Flow in Microchannel., , and . CSC, page 55-62. CSREA Press, (2006)A downlink group pre-coding scheme for MBMS in distributed MIMO system., , , and . BMSB, page 1-4. IEEE, (2014)Efficient Processing of Reverse Top-k Dominating Queries., , and . CSAI/ICIMT, page 115-119. ACM, (2018)Recursive Inception Network for Super-Resolution., , , , , , , and . ICPR, page 2759-2764. IEEE Computer Society, (2018)Leveraging Communication Information among Readers for RFID Data Cleaning., , , and . WAIM, volume 6897 of Lecture Notes in Computer Science, page 201-213. Springer, (2011)