Author of the publication

KCSR: Keymatches Constrained Secure Routing in Heterogeneous Wireless Sensor Networks.

, , , , , and . ICEIS (4), page 13-22. SciTePress, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influence maximisation in social networks., , and . Int. J. Comput. Sci. Eng., 18 (2): 103-117 (2019)QoS group based optimal retransmission medium access protocol for wireless sensor networks., , , , , and . CoRR, (2014)KCSR: Keymatches Constrained Secure Routing in Heterogeneous Wireless Sensor Networks., , , , , and . ICEIS (4), page 13-22. SciTePress, (2011)Query Click and Text Similarity Graph for Query Suggestions., , , , , , and . MLDM, volume 9166 of Lecture Notes in Computer Science, page 328-341. Springer, (2015)Time stamp based set covering greedy algorithm., , and . CODS, page 110-111. ACM, (2015)PCVOS: Principal component variances based off-line signature verification., , , , , , , , and . ReTIS, page 195-199. IEEE, (2015)Target specific influence maximization: An approach to maximize adoption in labeled social networks., , and . COMSNETS, page 542-547. IEEE, (2017)Diffusion models and approaches for influence maximization in social networks., , and . ICACCI, page 1345-1351. IEEE, (2016)WNPWR: Web navigation prediction framework for webpage recommendation., , , , , , and . ReTIS, page 120-125. IEEE, (2015)Ranking Search Engine Result Pages based on Trustworthiness of Websites, , , , , and . CoRR, (2012)