Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Adaptive Approach for Multi-Agent Formation Control in MANET Based on CPS Perspective., , , and . J. Networks, 9 (5): 1169-1177 (2014)Polynomially Uncomputable Number-Theoretic Problems in Cryptography and Network Security., , and . FCS, page 195-199. CSREA Press, (2006)M-KAD: A Scalable Peer-to-Peer System for Similarity Search in Metric Space., , , , and . SERA (selected papers), volume 253 of Studies in Computational Intelligence, page 71-81. Springer, (2009)Deep Analysis of Intending Peer-to-Peer Botnet., , , , and . GCC, page 407-411. IEEE Computer Society, (2008)Hybrid Cluster Routing: An Efficient Routing Protocol for Mobile Ad Hoc Networks., , , , and . ICC, page 3554-3559. IEEE, (2006)Research on Internet Storage Service Model and Protocol Based IPv6., , and . CSIE (3), page 96-100. IEEE Computer Society, (2009)NCCPIS: A Co-simulation Tool for Networked Control and Cyber-Physical System Evaluation., , , and . NPC, volume 7513 of Lecture Notes in Computer Science, page 85-93. Springer, (2012)On-Demand Resource Allocation for Service Level Guarantee in Grid Environment., , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 678-689. Springer, (2005)Cryptographic and Computational Challenges in Grid Computing., , and . FCS, page 200-204. CSREA Press, (2006)An analytical study on routing overhead of two-level cluster-based routing protocols for mobile ad hoc networks., and . IPCCC, IEEE, (2006)