Author of the publication

Preserving source location privacy in monitoring-based wireless sensor networks.

, , and . IPDPS, IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework of memory consistency models., , and . J. Comput. Sci. Technol., 13 (2): 110-124 (1998)Using Confidence Interval to Summarize the Evaluating Results of DSM Systems., , and . J. Comput. Sci. Technol., 15 (1): 73-83 (2000)LTPPM: a location and trajectory privacy protection mechanism in participatory sensing., , , and . Wireless Communications and Mobile Computing, 15 (1): 155-169 (2015)Optimizing Home-Based Software DSM Protocols., , and . Cluster Computing, 4 (3): 235-242 (2001)Energy-Aware Scheduling of MapReduce Jobs for Big Data Applications., , , , and . IEEE Trans. Parallel Distrib. Syst., 26 (10): 2720-2733 (2015)A reputation-driven scheduler for autonomic and sustainable resource sharing in Grid computing., and . J. Parallel Distrib. Comput., 70 (2): 111-125 (2010)Adaptive Secure Access to Remote Services., , and . IEEE SCC (1), page 173-181. IEEE Computer Society, (2008)Privacy preserving shortest path routing with an application to navigation., , and . Pervasive and Mobile Computing, (2014)Power Measuring and Profiling., and . Handbook of Energy-Aware and Green Computing, Chapman and Hall/CRC, (2012)TRECON: A Framework for Enforcing Trusted ISP Peering., and . ICCCN, page 383-389. IEEE, (2006)