Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cascade effects of load shedding in coupled networks., , and . ICON, page 1-6. IEEE, (2013)Lifetime-Aware ISP Networks: Optimal Formulation and Solutions., , , , , , , , and . IEEE/ACM Trans. Netw., 25 (3): 1924-1937 (2017)Weighted algebraic connectivity metric for non-uniform traffic in reliable network design., , and . ICUMT, page 1-6. IEEE, (2009)Compute-and-forward for two-way relay.. CSNDSP, page 465-468. IEEE, (2014)Lifetime-aware networks: It is not what you know but who you know., , , and . GlobalSIP, page 137-140. IEEE, (2015)The multiple-key blom's scheme for key establishment in mobile ad hoc sensor networks., , and . APCC, page 427-432. IEEE, (2013)Algebraic connectivity metric for spare capacity allocation problem in survivable networks., , and . Comput. Commun., 34 (12): 1425-1435 (2011)Assuring Privacy-Preservation in Mining Medical Text Materials for COVID-19 Cases - A Natural Language Processing Perspective., , , and . Open J. Internet Things, 6 (1): 6-13 (2020)Trust of the Same: Rethinking Trust and Reputation Management from a Structural Homophily Perspective., , , and . Int. J. Inf. Secur. Priv., 9 (2): 13-30 (2015)Combating Hard or Soft Disasters with Privacy-Preserving Federated Mobile Buses-and-Drones based Networks., , , , and . IRI, page 31-36. IEEE, (2020)