Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital pheromone based patrolling algorithm in wireless sensor and actuator networks., and . CCNC, page 496-501. IEEE, (2013)A novel cooperative communication protocol for QoS provisioning in wireless sensor networks., , , , and . TRIDENTCOM, page 1-6. IEEE Computer Society, (2009)Secure data aggregation without persistent cryptographic operations in wireless sensor networks., , , and . IPCCC, IEEE, (2006)Achieving Accountable MapReduce in cloud computing., and . Future Generation Comp. Syst., (2014)Aggregation with fragment retransmission for very high-speed WLANs., , , , , and . IEEE/ACM Trans. Netw., 17 (2): 591-604 (2009)Disturbance attenuation for nonlinear switched descriptor systems based on neural network., , , and . Neural Computing and Applications, 23 (7-8): 2211-2219 (2013)Cryptography Efficient Permutation Instructions for Fast Software., , and . IEEE Micro, 21 (6): 56-69 (2001)A New Overflow Replacement Policy for Efficient Location Management in Mobile Networks., , , , and . ICDCS Workshops, page 830-. IEEE Computer Society, (2003)Beyond local phase quantization: Mid-level blurred image representation using fisher vector., , , and . ICIP, page 1890-1894. IEEE, (2015)LaCasa: Location and context-aware safety assistant., , , and . PervasiveHealth, page 171-174. IEEE, (2012)