From post

On a Family of Strong Geometric Spanners That Admit Local Routing Strategies.

, , , , и . WADS, том 4619 из Lecture Notes in Computer Science, стр. 300-311. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Geometric spanners with small chromatic number., , , , , и . Comput. Geom., 42 (2): 134-146 (2009)Incremental Construction of k-Dominating Sets in Wireless Sensor Networks., , , и . Ad Hoc Sens. Wirel. Networks, 5 (1-2): 47-68 (2008)Navigating and visualizing the malware intelligence space., , , и . IEEE Netw., 26 (6): 19-25 (2012)On a Family of Strong Geometric Spanners That Admit Local Routing Strategies., , , , и . WADS, том 4619 из Lecture Notes in Computer Science, стр. 300-311. Springer, (2007)Automatic Evaluation of Intrusion Detection Systems., , , , и . ACSAC, стр. 361-370. IEEE Computer Society, (2006)Spanners of Complete $k$-Partite Geometric Graphs, , , , , и . CoRR, (2007)Incremental Construction of k-Dominating Sets in Wireless Sensor Networks., , , и . OPODIS, том 4305 из Lecture Notes in Computer Science, стр. 202-214. Springer, (2006)Exploring network-based malware classification., , и . MALWARE, стр. 14-20. IEEE Computer Society, (2011)On a family of strong geometric spanners that admit local routing strategies., , , , и . Comput. Geom., 44 (6-7): 319-328 (2011)Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases., , и . PST, (2005)