Author of the publication

Pruning Update Log Files in Intermittently Connected Databases.

, , and . Wireless Information Systems, page 63-72. INSTICC Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure and Lightweight Protocol for Message Authentication in Wireless Sensor Networks., , and . IEEE Syst. J., 15 (3): 3808-3819 (2021)Analysis of the Bluetooth device discovery protocol., , , , and . Wirel. Networks, 16 (2): 421-436 (2010)An energy efficient real-time vehicle tracking system., , , and . PACRIM, page 1-6. IEEE, (2017)Energy-as-a-Service (EaaS): On the Efficacy of Multimedia Cloud Computing to Save Smartphone Energy., , , and . IEEE CLOUD, page 764-771. IEEE Computer Society, (2012)Scalable Update Propagation in Partially Replicated, Disconnected Client Server Databases., , and . ICEIS (1), page 11-21. (2006)Investigation of effective region for data dissemination in road networks using vehicular ad hoc network., , and . FUZZ-IEEE, page 1977-1982. IEEE, (2009)Performance analysis of the node cooperative ARQ scheme for wireless ad-hoc networks., , , and . GLOBECOM, page 5. IEEE, (2005)A Socially-Based Routing Protocol for Delay Tolerant Networks., , , and . GLOBECOM, page 1-5. IEEE, (2010)Augmented YARA Rules Fused With Fuzzy Hashing in Ransomware Triaging., , , , , and . SSCI, page 625-632. IEEE, (2019)Smart mobile web browsing., , and . iCAST/UMEDIA, page 671-679. IEEE, (2013)