Author of the publication

Data filtering and dynamic sensing for continuous monitoring in wireless sensor networks.

, , and . IJAACS, 3 (3): 239-264 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel Misuse and Anomaly Detection Model., , and . Int. J. Netw. Secur., 14 (4): 211-222 (2012)Network Forensic Analysis by Correlation of Attacks with Network Attributes., , and . ICT, volume 101 of Communications in Computer and Information Science, page 124-128. Springer, (2010)Low Overhead Optimal Checkpointing for Mobile Distributed Systems., , and . ICDE, page 686-688. IEEE Computer Society, (2003)Missing Value Imputation Based on K-Mean Clustering with Weighted Distance., , and . IC3 (1), volume 94 of Communications in Computer and Information Science, page 600-609. Springer, (2010)Finding Similarity in Time Series Data by Method of Time Weighted Moments., and . ADC, volume 39 of CRPIT, page 155-164. Australian Computer Society, (2005)Message-Task Scheduling in Object-Oriented Heterogeneous GURU Distributed DBMS., , and . ICPP (3), page 235-242. CRC Press, (1994)Fault Tolerant Double Tree Multistage Interconnection Network., , , and . INFOCOM, page 462-468. IEEE Computer Society, (1991)Ant colony based rule generation for reusable software component retrieval., , and . ISEC, page 129-130. ACM, (2008)An Efficient Intrusion Detection System Using Clustering Combined with Fuzzy Logic., and . IC3 (1), volume 94 of Communications in Computer and Information Science, page 218-228. Springer, (2010)Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach., and . IC3, volume 40 of Communications in Computer and Information Science, page 510-520. Springer, (2009)