Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A unified security framework with three key management schemes for wireless sensor networks., , , , , and . Comput. Commun., 31 (18): 4269-4280 (2008)Binding Multiple Applications on Wireless Sensor Networks., , and . GPC, volume 3947 of Lecture Notes in Computer Science, page 250-258. Springer, (2006)A Proxy-Enabled Service Discovery Architecture to Find Proximity-Based Services in 6LoWPAN., , , , and . EUC, volume 4096 of Lecture Notes in Computer Science, page 956-965. Springer, (2006)HybLoc: Hybrid Indoor Wi-Fi Localization Using Soft Clustering-Based Random Decision Forest Ensembles., , and . IEEE Access, (2018)Adaptive Yaw Rate Aware Sensor Wakeup Schemes Protocol (A-YAP) for Target Prediction and Tracking in Sensor Networks., , , , and . IEICE Trans. Commun., 91-B (11): 3524-3533 (2008)CEnsLoc: Infrastructure-Less Indoor Localization Methodology Using GMM Clustering-Based Classification Ensembles., , and . Mob. Inf. Syst., (2018)An empirical study to analyze the feasibility of WIFI for VANETs., , , , and . CSCWD, page 553-558. IEEE, (2008)Collaborative routing and data delivery architecture for commercial wireless sensor networks., , , and . EURASIP J. Wirel. Commun. Netw., (2013)VISTA: achieving cumulative VIsion through energy efficient Silhouette recognition of mobile Targets through collAboration of visual sensor nodes., , , , and . EURASIP J. Image Video Process., (2014)SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks., , , , , , and . J. Supercomput., 74 (10): 5022-5040 (2018)