Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internal Nodes based Broadcasting In Wireless Networks., , and . HICSS, IEEE Computer Society, (2001)Evolutionary Strategy for Learning Multiple-Valued Logic Functions., , and . ISMVL, page 154-160. IEEE Computer Society, (2004)On the Number of Multilinear Partitions and the Computing Capacity of Multiple-Valued Multiple-Threshold Perceptrons., , and . ISMVL, page 208-213. IEEE Computer Society, (1999)Strictly Localized Sensor Self-Deployment for Optimal Focused Coverage., , , and . IEEE Trans. Mob. Comput., 10 (11): 1520-1533 (2011)Access Control in Distributed Systems: Merging Theory with Practice.. TrustCom, page 1-2. IEEE Computer Society, (2011)On delivery guarantees of face and combined greedy-face routing in ad hoc and sensor networks., and . MobiCom, page 390-401. ACM, (2006)RNG and internal node based broadcasting algorithms for wireless one-to-one networks., , and . Mobile Computing and Communications Review, 5 (2): 37-44 (2001)Localized sensor self-deployment with coverage guarantee., , , and . Mobile Computing and Communications Review, 12 (2): 50-52 (2008)On Set-Valued Functions and Boolean Collections., , , and . ISMVL, page 250-254. IEEE Computer Society, (1992)Completeness Criteria in Many-Valued Set Logic under Compositions with Boolean Functions.. ISMVL, page 177-183. IEEE Computer Society, (1994)