Author of the publication

A middleware architecture for disseminating delay-constrained information in wireless sensor networks.

, , , and . J. Netw. Comput. Appl., 35 (1): 403-411 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A User Pattern Learning Strategy for Managing Users' Mobility in UMTS Networks.. IEEE Trans. Mob. Comput., 4 (6): 552-566 (2005)On Consistency of Operational Transformation Approach, , , and . Infinity, volume 107 of EPTCS, page 45-59. (2012)Prediction of Traffic Flow via Connected Vehicles., , and . CoRR, (2020)A Tabu search approach for a virtual networks splitting strategy across multiple cloud providers., , and . Int. J. Metaheuristics, 7 (3): 197-238 (2020)Seamless Mobility Management Schemes for IPv6-based Wireless Networks., , , , and . Mob. Networks Appl., 19 (6): 745-757 (2014)A knowledge-based approach for managing urban infrastructures., and . Knowl. Based Syst., 15 (8): 449-463 (2002)A New Mutual Authentication and Key Agreement Protocol for Mobile Client - Server Environment., , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1275-1286 (2021)Privacy-preserving model for biometric-based authentication and Key Derivation Function., , and . J. Inf. Secur. Appl., (November 2023)An Efficient Approach Based on Ant Colony Optimization and Tabu Search for a Resource Embedding Across Multiple Cloud Providers., , and . IEEE Trans. Cloud Comput., 9 (3): 896-909 (2021)A memetic algorithm for assigning cells to switches in cellular mobile networks., and . IEEE Communications Letters, 6 (11): 484-486 (2002)