Author of the publication

Belief based data cleaning for wireless sensor networks.

, , and . Wireless Communications and Mobile Computing, 12 (5): 406-419 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed Multicast Routing Protocol for Real-Time Multicast Applications., , , and . Computer Networks, 31 (1-2): 101-110 (1999)A Message from the Incoming Editor-in-Chief.. JCM, 4 (1): 1-2 (2009)A Simulation Study of Token-Based Mutual-Exlusion Algorithms in Distributed Systems., , and . Int. Journal in Computer Simulation, 4 (1): 65-88 (1994)A Unified Model and Methodology for Temporal Object Databases., and . Int. J. Cooperative Inf. Syst., 2 (2): 201-224 (1993)Belief based data cleaning for wireless sensor networks., , and . Wireless Communications and Mobile Computing, 12 (5): 406-419 (2012)A modular methodology to verify communication protocols., and . Computer Communications, 20 (12): 1069-1077 (1997)A real-time multicast routing algorithm for multimedia applications., , and . Computer Communications, 20 (12): 1098-1106 (1997)Efficient detection and resolution of deadlocks in distributed databases., and . Computer Communications, 22 (7): 637-643 (1999)An Efficient Solution To The Critical Section Problem In Distributed Systems., , and . ICPP (2), page 77-80. CRC Press, (1994)Providing Performance Guarantees for Buffered Crossbar Switches without Speedup., , , and . QSHINE, volume 22 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 297-314. Springer, (2009)