Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Limiting Sybil Attacks in Structured P2P Networks., , , and . INFOCOM, page 2596-2600. IEEE, (2007)Performance Evaluation of IRIS and LOTUS Motes When Communicating in Real Environments., and . IJDSN, 12 (2): 7347158:1-7347158:10 (2016)Performance of GPSR and AOMDV in WSNs with Uncontrolled Mobility., and . EUSPN/ICTH, volume 98 of Procedia Computer Science, page 48-55. Elsevier, (2016)Data delivery in wireless sensor networks with uncontrollable mobile nodes., and . Int. J. Sens. Networks, 26 (4): 213-226 (2018)Assigning Sensors to Competing Missions., , , , and . GLOBECOM, page 44-49. IEEE, (2008)Sensor-mission assignment in wireless sensor networks., , , , , and . ACM Trans. Sens. Networks, 6 (4): 36:1-36:33 (2010)Mitigating Performance Degradation in Congested Sensor Networks., , , , , , and . IEEE Trans. Mob. Comput., 7 (6): 682-697 (2008)Data Collection Using RFID and a Mobile Reader., , , , and . GLOBECOM, page 741-746. IEEE, (2008)Assigning Sensors to Missions with Demands., , , , , and . ALGOSENSORS, volume 4837 of Lecture Notes in Computer Science, page 114-125. Springer, (2007)Location Privacy and Energy Preservation in Sensor Allocation Systems.. IJDSN, (2012)