Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

i-m-Space: interactive multimedia-enhanced space for rehabilitation of breast cancer patients., , , , , , , , , and 9 other author(s). ACM Multimedia, page 623-626. ACM, (2010)Tree-based Multicast Key Management in ubiquitous computing environment., , , , and . IJAHUC, 8 (1/2): 27-35 (2011)Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set., , , , and . IMIS, page 213-220. IEEE, (2015)A Multi-node Renewable Algorithm Based on Charging Range in Large-Scale Wireless Sensor Network., , , , and . IMIS, page 94-100. IEEE, (2015)Algorithm for Fast Spatial Outlier Detection., , , , and . ICYCS, page 1872-1877. IEEE Computer Society, (2008)A Selfish Node Preventive Real Time Fault Tolerant Routing Protocol for WSNs., , , , , and . iThings/CPSCom, page 330-337. IEEE Computer Society, (2011)A Game Theoretic Approach for Interuser Interference Reduction in Body Sensor Networks., , , , , and . IJDSN, (2011)A Hop-by-hop Cross-layer Congestion Control Scheme for Wireless Sensor Networks., , , , and . JSW, 6 (12): 2434-2440 (2011)A Group Key Management Protocol Based on Weight-Balanced 2-3 Tree for Wireless Sensor Networks, , , , and . CoRR, (2012)A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems, , , and . CoRR, (2012)