Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel realistic irregular radio model to enhance coverage evaluation in wireless sensor networks., , and . SoftCOM, page 160-164. IEEE, (2014)On the impact of irregular radio propagation on coverage control and sleep scheduling in wireless sensor networks., , and . AICCSA, page 1-8. IEEE Computer Society, (2010)A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor Networks., , and . TrustCom, page 1077-1082. IEEE Computer Society, (2012)A hole detection scheme based on polygonal cycles for the irregular radio range in WSN., , and . MOBIWAC, page 31-38. ACM, (2014)Doppler Effect on Location-Based Tracking in Mobile Sensor Networks., , and . AICCSA, page 252-257. IEEE Computer Society, (2007)Border surveillance using sensor based thick-lines., , and . ICOIN, page 221-226. IEEE Computer Society, (2013)DynTunKey: a dynamic distributed group key tunneling management protocol for heterogeneous wireless sensor networks., and . EURASIP J. Wireless Comm. and Networking, (2014)TargMoveS: An optimized sensor scheduling scheme based on target mobility variations., and . WMNC, page 1-8. IEEE, (2014)Border surveillance: A dynamic deployment scheme for WSN-based solutions., , , and . WMNC, page 1-8. IEEE, (2013)Coverage control and irregular radio propagation in eireless sensor networks., , and . WCNC, page 2474-2479. IEEE, (2009)