Author of the publication

Evaluation of an entropy-based k-anonymity model for location based services.

, and . ICNC, page 374-378. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Graph Matching Approach to Optimal Task Assignment in Distributed Computing Systems Using a Minimax Criterion., and . IEEE Trans. Computers, 34 (3): 197-203 (1985)Power Efficient User Pairing for Multicasting in Heterogeneous Wireless Networks., , , and . MILCOM, page 1353-1358. IEEE, (2013)Protocol-independent multicast packet delivery improvement service for mobile Ad hoc networks., and . Ad Hoc Networks, 5 (2): 210-227 (2007)What does using TCP as an evaluation tool reveal about MANET routing protocols?, and . IWCMC, page 521-526. ACM, (2006)A cross-layer approach to resource discovery and distribution in mobile ad hoc networks., , and . Mobility Conference, page 54. ACM, (2006)Extending Proportional Fair Scheduling to Buffer-Aided Relay Access Networks., , , and . IEEE Trans. Vehicular Technology, 68 (1): 1041-1044 (2019)Adaptive topology control for heterogeneous mobile ad hoc networks using power estimation., , and . WCNC, page 392-399. IEEE, (2006)Deploying Directional Sensor Networks with Guaranteed Connectivity and Coverage., , , and . SECON, page 153-160. IEEE, (2008)Coordinated power conservation for ad hoc networks., and . ICC, page 3330-3335. IEEE, (2002)CONI: Credit-Based Overlay and Interweave Dynamic Spectrum Access Protocol for Multi-Hop Cognitive Radio Networks., , and . GLOBECOM, page 1-6. IEEE, (2011)