Author of the publication

A Specialized Tool for Simulating Lock-Keeper Data Transfer.

, , , and . AINA, page 182-189. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DynMAC: A resistant MAC protocol to coexistence in wireless sensor networks., , , , and . Computer Networks, (2015)A scalable localization system for critical controlled wireless sensor networks., , , , , , , and . ICUMT, page 302-309. IEEE, (2014)Characteristics of Channels of IEEE 802.15.4 Compliant Sensor Networks., , , and . Wireless Personal Communications, 67 (3): 541-556 (2012)A Web Service-Based Framework Model for People-Centric Sensing Applications Applied to Social Networking., , , , , and . Sensors, 12 (2): 1688-1701 (2012)An Adaptable Framework for Interoperating Between Wireless Sensor Networks and External Applications., , , and . SENSORNETS, page 95-102. SciTePress, (2014)A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification., , , and . NPC, page 190-196. IEEE Computer Society, (2009)An Approach for Plagiarism Detection in Learning Resources., , and . FDSE, volume 11814 of Lecture Notes in Computer Science, page 722-730. Springer, (2019)A Specialized Tool for Simulating Lock-Keeper Data Transfer., , , and . AINA, page 182-189. IEEE Computer Society, (2010)Deep Matrix Factorization for Learning Resources Recommendation., , and . ICCCI, volume 12876 of Lecture Notes in Computer Science, page 167-179. Springer, (2021)