Author of the publication

Time Optimal Algorithms for Black Hole Search in Rings.

, , , and . COCOA (2), volume 6509 of Lecture Notes in Computer Science, page 58-71. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Sybil Resistant IoT Trust Model Using Blockchains., and . iThings/GreenCom/CPSCom/SmartData, page 1017-1026. IEEE, (2018)A new image encryption algorithm based on a chaotic DNA substitution method., and . ICC, page 1011-1015. IEEE, (2012)DiSEL: a distance based slot selection protocol for framed slotted ALOHA RFID systems., and . WCNC, page 1497-1502. IEEE, (2009)Backward Link Authentication For RFID tags., , and . RFID-TA, page 348-352. IEEE, (2011)New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version)., and . IACR Cryptology ePrint Archive, (2008)Incorporating service and user information and latent features to predict QoS for selecting and recommending cloud service compositions., , , and . Clust. Comput., 19 (3): 1227-1242 (2016)Iterative Boolean combination of classifiers in the ROC space: An application to anomaly detection with HMMs., , , and . Pattern Recognit., 43 (8): 2732-2752 (2010)Adaptive ROC-based ensembles of HMMs applied to anomaly detection., , , and . Pattern Recognit., 45 (1): 208-230 (2012)An Application of theBruhat Decomposition to the Design of Full Diversity Unitary Space-Time Codes., , and . IEEE Trans. Inf. Theory, 55 (1): 232-244 (2009)Unitary Space-Time Constellation Designs From Group Codes., , and . IEEE Trans. Inf. Theory, 53 (11): 4322-4329 (2007)