Author of the publication

A BP-Neural Network Improvement to Hop-Counting for Localization in Wireless Sensor Networks.

, , , and . Tools and Applications with Artificial Intelligence, volume 166 of Studies in Computational Intelligence, Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource-Limited Hyper-Reproductions: Electronically Reproducing and Extending Lectures., , and . Multimedia Tools Appl., 6 (2): 181-197 (1998)Detecting Wormhole Attacks in Wireless Sensor Networks., , , and . Critical Infrastructure Protection, volume 253 of IFIP, page 267-279. Springer, (2007)A surface-based approach for classification of 3D neuroanatomic structures., , , and . Intell. Data Anal., 8 (6): 519-542 (2004)Attack detection in time series for recommender systems., , , and . KDD, page 809-814. ACM, (2006)Data Brokers: Building Collections through Automated Negotiation., , , , , and . SETN, volume 3025 of Lecture Notes in Computer Science, page 13-22. Springer, (2004)Neighboring Feature Clustering., , , , , and . SETN, volume 3955 of Lecture Notes in Computer Science, page 605-608. Springer, (2006)SCENS: A System for the Mediated Sharing of Sensitive Data., , , , , , , and . JCDL, page 263-. IEEE Computer Society, (2003)PrivaSense: providing privacy protection for sensor networks., , , and . SenSys, page 415-416. ACM, (2007)Multimedia Interfaces for E-Commerce., , , , , and . WebNet, page 445-450. AACE, (1999)Extraction of Discriminative Functional MRI Activation Patterns and an Application to Alzheimer's Disease., , , , , , , , and . MICCAI (2), volume 3217 of Lecture Notes in Computer Science, page 727-735. Springer, (2004)