Author of the publication

Utilizing silent negative voting and sleep/wakeup method for power efficient data fusion.

, , and . ICNC, page 1000-1004. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing lifetime of sensor surveillance systems., , , , , and . IEEE/ACM Trans. Netw., 15 (2): 334-345 (2007)Preference-Function Algorithm: a novel approach for selection of the users' preferred websites., , , and . Int. J. Bus. Intell. Data Min., 2 (3): 328-346 (2007)Enhancing Node Cooperation in Mobile Ad Hoc Network., and . J. Networks, 8 (3): 645-649 (2013)Flooding isolated region reassignment., , and . GrC, page 361-364. IEEE, (2006)An Efficient and Robust Routing Protocol for Data Aggregation., , and . WASA, volume 4138 of Lecture Notes in Computer Science, page 175-186. Springer, (2006)Multiconstrained QoS Routing: A Norm Approach., and . IEEE Trans. Computers, 56 (6): 859-863 (2007)An Indexing Structure for Mobile Objects Utilizing Late Update., , and . ITNG, page 162-167. IEEE Computer Society, (2010)Algorithm and Theory for Robust Wireless Sensor Networks 2014., , , , , and . IJDSN, (2015)Utilizing Intelligent Middleware for Reconfiguration of Applications on Android., , , and . ICHIT (1), volume 6935 of Lecture Notes in Computer Science, page 81-89. Springer, (2011)Why it is Hard to Fight against Cyber Criminals?, , , and . ICDCS Workshops, page 537-541. IEEE Computer Society, (2012)