Author of the publication

A Distributed Clustering Scheme for Underwater Wireless Sensor Networks.

, and . PIMRC, page 1-5. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparative Evaluation of Two Scalable QoS Architectures., , , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 1452-1457. Springer, (2004)FSAD: Flow Similarity Analysis for Anomaly Detection in Cloud Applications., , and . CloudCom, page 426-429. IEEE Computer Society, (2015)Usability assessment of a Health Kiosk., , and . ISCC, page 260-265. IEEE Computer Society, (2017)DMFD: Non-Intrusive Dependency Inference and Flow Ratio Model for Performance Anomaly Detection in Multi-Tier Cloud Applications., , and . CLOUD, page 164-173. IEEE, (2019)Secure Routing in Ad Hoc Networks for Reactive Next Hop Routing Protocols., , , and . International Conference on Wireless Networks, page 109-115. CSREA Press, (2004)Secure Routing in Ad Hoc Networks., , , and . Ad Hoc Sens. Wirel. Networks, 1 (4): 277-300 (2005)SRBQ and RSVPRAgg: A Comparative Study., , , and . ICT, volume 3124 of Lecture Notes in Computer Science, page 1210-1217. Springer, (2004)A Framework for BGP Abnormal Events Detection., , and . CoRR, (2017)FlowBox: Anomaly Detection Using Flow Analysis in Cloud Applications., , and . GLOBECOM, page 1-6. IEEE, (2015)Providing end-to-end QOS in 4G networks., , , and . Communications and Computer Networks, page 188-195. IASTED/ACTA Press, (2005)