Author of the publication

A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks.

, , , and . IEEE Trans. Computers, 64 (3): 627-639 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of packet loss for batch traffic arrivals in IEEE 802.15.4-based networks., , and . LCN, page 117-122. IEEE Computer Society, (2011)An Optimal SVD-based Watermarking Framework through Linear Programming., and . EuroIMSA, page 271-274. IASTED/ACTA Press, (2005)Bayesian inference of private social network links using prior information and propagated data., , and . J. Parallel Distrib. Comput., (2019)A Computationally Intelligent Hierarchical Authentication and Key Establishment Framework for the Internet of Things., , and . IEEE Internet Things Mag., 3 (4): 36-39 (2020)Overhearing Gain Analysis in Low-Traffic CDMA Wireless Sensor Networks., , , and . SUTC/UMC, page 89-94. IEEE Computer Society, (2010)An Adaptive Network Allocation Vector for IEEE 802.11-based Multi-hop Networks., , , and . FGCN (1), page 279-282. IEEE Computer Society, (2008)Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps., , and . IET Information Security, 9 (4): 234-239 (2015)A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks., , , , , and . IEEE Trans. Computers, 64 (3): 640-653 (2015)A Markov model of safety message broadcasting for vehicular networks., , , and . WCNC, page 1657-1662. IEEE, (2013)Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks., , , and . IEEE Trans. Information Forensics and Security, 6 (4): 1185-1199 (2011)