Author of the publication

Logical Location-based Routing with Hole-shadowing in Large-scale MANETs.

, , and . ICC, page 3560-3565. IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed Power-Efficient Data Gathering and Aggregation Protocol for Wireless Sensor Networks., , , , and . ISPA, volume 3758 of Lecture Notes in Computer Science, page 743-756. Springer, (2005)A Discrete Event System Model for Simulating Mobile Agent., , , and . ISPA, volume 3758 of Lecture Notes in Computer Science, page 701-712. Springer, (2005)QoS-Driven Multicast Tree Generation Using Genetic Algorithm., , , , and . APPT, volume 2834 of Lecture Notes in Computer Science, page 404-413. Springer, (2003)Cost Aware Service Placement and Load Dispatching in Mobile Cloud Systems., , , and . IEEE Trans. Computers, 65 (5): 1440-1452 (2016)Multi-User Computation Partitioning for Latency Sensitive Mobile Cloud Applications., , , and . IEEE Trans. Computers, 64 (8): 2253-2266 (2015)Topology-Aware Energy Efficient Task Assignment for Collaborative In-Network Processing in Distributed Sensor Systems., , , , , and . DIPES, volume 271 of IFIP, page 201-211. Springer, (2008)Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring., , , and . IEEE Trans. Computers, 64 (2): 382-395 (2015)A Fuzzy-Based Service Adaptation Middleware for Context-Aware Computing., , , and . EUC, volume 4096 of Lecture Notes in Computer Science, page 580-590. Springer, (2006)Towards a Programmable Mobile IP., , , and . Mobile Data Management, volume 1987 of Lecture Notes in Computer Science, page 210-221. Springer, (2001)Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor., , , and . ACISP, volume 5107 of Lecture Notes in Computer Science, page 361-375. Springer, (2008)