Author of the publication

Access-Pattern Aware Checkpointing Data Storage Scheme for Mobile Computing Environment.

, , , , and . FNC/MobiSPC, volume 34 of Procedia Computer Science, page 330-337. Elsevier, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perception-based reversible watermarking for 2D vector maps., , and . VCIP, volume 7744 of SPIE Proceedings, page 774434. SPIE, (2010)Cooperative Work Systems for the Security of Digital Computing Infrastructure., , , , and . ICPADS, page 676-681. IEEE Computer Society, (2010)Perception-driven watermarking with evolutionary block mapping., , and . VCIP, volume 7744 of SPIE Proceedings, page 77441X. SPIE, (2010)Topo-Semantic Constraints Checking., , , and . ISPA, page 608-613. IEEE Computer Society, (2008)A recursive embedding algorithm towards lossless 2D vector map watermarking., , and . Digit. Signal Process., 23 (3): 912-918 (2013)Reversible fragile watermarking for locating tampered blocks in 2D vector maps., and . Multimedia Tools Appl., 67 (3): 709-739 (2013)Double Propagation Stereo Matching for Urban 3-D Reconstruction From Satellite Imagery., , , and . IEEE Trans. Geosci. Remote. Sens., (2022)An Adaptive Energy-Efficient and Low-Latency MAC Protocol in Wireless Sensor Networks., , , and . International Conference on Computational Science (3), volume 4489 of Lecture Notes in Computer Science, page 166-169. Springer, (2007)A Two-Phase Time-based Consistent Checkpointing Strategy., , and . ITNG, page 518-523. IEEE Computer Society, (2006)Internet Accessing for IPv6 MANETs., , and . ITNG, page 638-645. IEEE Computer Society, (2006)