Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN)., , and . Secur. Commun. Networks, (2019)An open solution to fault-tolerant Ethernet: design, prototyping, and evaluation., , , , , , and . IPCCC, page 461-468. IEEE, (1999)Fault recovery port-based fast spanning tree algorithm (FRP-FAST) for the fault-tolerant Ethernet on the arbitrary switched network topology.. ETFA (1), page 325-332. IEEE, (2001)HiCARE: Hierarchical Clustering Algorithm for Road Service Routing Enhancement., , and . IEEE Access, (2023)Informal Technology Education for Women Transitioning from Incarceration., , , , , , , , , and 2 other author(s). ACM Trans. Comput. Educ., 21 (2): 16:1-16:16 (2021)Characterizing Scattered Occlusions for Effective Dense-Mode Crowd Counting., , , and . ICCVW, page 3833-3842. IEEE, (2021)CAMEL: Centrality-Aware Multitemporal Discovery Protocol for Software-defined Networks., , and . ICCCN, page 1-8. IEEE, (2021)ABBA: Advance Block Body Agreement for Scaling Blockchain Networks., , and . ICC, page 50-55. IEEE, (2022)CATS: Crowd-based Alert and Tracing Services for building a Safe Community Cluster against COVID-19., , , and . IM, page 697-701. IEEE, (2021)SWANS: SDN-based Wormhole Analysis using the Neighbor Similarity for a Mobile ad hoc network (MANET)., , and . IM, page 653-657. IEEE, (2021)