Author of the publication

An Energy-Efficient Broadcast Protocol in MANETs: Design and Evaluation.

, , , and . CNSR, page 199-206. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Energy-Efficient Broadcast Protocol in MANETs: Design and Evaluation., , , and . CNSR, page 199-206. IEEE Computer Society, (2010)Frequency Measurement of the Automatic Generator Quasi-synchronizer Based on PIC16F877 and FPGA., , and . PACCS, page 220-223. IEEE Computer Society, (2009)Mechanistic investigation inspired "on water" reaction for hydrobromic acid-catalyzed Friedel-Crafts-type reaction of β-naphthol and formaldehyde., , , , , and . Journal of Computational Chemistry, 38 (26): 2268-2275 (2017)Enable Privacy Preservation and Result Verification for Top-k Query in Two-Tiered Sensor Networks., , , , , and . TrustCom/BigDataSE/ISPA (1), page 555-562. IEEE, (2015)A Real-Time Suspicious Stay Detection System Based on Face Detection and Tracking in Monitor Videos., , and . ISCID (1), page 264-267. IEEE, (2017)Predicting Student Examinee Rate in Massive Open Online Courses., , , , , , and . DASFAA Workshops, volume 10179 of Lecture Notes in Computer Science, page 340-351. Springer, (2017)Mixed Numerologies Interference Analysis and Inter-Numerology Interference Cancellation for Windowed OFDM Systems., , , , , and . IEEE Trans. Vehicular Technology, 67 (8): 7047-7061 (2018)Sybil Detection in Social-Activity Networks: Modeling, Algorithms and Evaluations., , and . ICNP, page 44-54. IEEE Computer Society, (2018)SET: Secure and Efficient Top-k Query in Two-Tiered Wireless Sensor Networks., , , , and . APWeb/WAIM (1), volume 10366 of Lecture Notes in Computer Science, page 495-510. Springer, (2017)Design of a Trust Model and Finding Key-Nodes in Rumor Spreading Based on Monte-Carlo Method., , , and . MASS, page 790-795. IEEE Computer Society, (2009)