Author of the publication

Polytype target coverage scheme for heterogeneous wireless sensor networks using linear programming.

, , and . Wireless Communications and Mobile Computing, 14 (14): 1397-1408 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems., , , , , , and . IEEE Trans. Parallel Distrib. Syst., 25 (2): 279-282 (2014)Hole Avoiding in Advance Routing with Hole Recovery Mechanism in Wireless Sensor Networks., , , , and . Ad Hoc & Sensor Wireless Networks, 16 (1-3): 191-138 (2012)Integer Programming Scheme for Target Coverage in Heterogeneous Wireless Sensor Networks., , and . MSN, page 79-84. IEEE Computer Society, (2010)Blockchain and Big Data to Transform the Healthcare., , , , , and . ICDPA, page 62-68. ACM, (2018)Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks., , and . TrustCom/BigDataSE/ICESS, page 58-64. IEEE Computer Society, (2017)Theory of (n) truth degrees of formulas in modal logic and a consistency theorem., and . Science in China Series F: Information Sciences, 52 (1): 70-83 (2009)Borel probabilistic and quantitative logic., and . SCIENCE CHINA Information Sciences, 54 (9): 1843-1854 (2011)Theory of truth degrees of propositions in the logic system Ln*., and . Science in China Series F: Information Sciences, 49 (4): 471-483 (2006)Message matching-based greedy behavior detection in delay tolerant networks., and . J. Comput. Syst. Sci., 80 (5): 903-915 (2014)Special issue of JCSS on UbiSafe computing and communications., , , and . J. Comput. Syst. Sci., 79 (5): 515-517 (2013)