From post

Performance Comparison of Various Routing Protocols in Different Mobility Models

, , и . International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), 3 (4): 13 (августа 2012)
DOI: 10.5121/ijasuc.2012.3408

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Efficient and Secure Micro-payment Transaction Using Shell Cryptography., , , , и . QSHINE, том 115 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 461-469. Springer, (2013)Image denoising using local contrast and adaptive mean in wavelet transform domain., , и . Int. J. Wavelets Multiresolution Inf. Process., (2014)Integrated approach to prevent SQL injection attack and reflected cross site scripting attack., , и . Int. J. Syst. Assur. Eng. Manag., 3 (4): 343-351 (2012)A simulation based optimization approach for spare parts forecasting and selective maintenance., , и . Reliab. Eng. Syst. Saf., (2017)EpiCombFlu: exploring known influenza epitopes and their combination to design a universal influenza vaccine., , , , и . Bioinform., 29 (15): 1904-1907 (2013)Meta Learning for Few-Shot Medical Text Classification., , и . CoRR, (2022)A lightweight and unsupervised approach for identifying risk events in news articles., , , и . ICDM (Workshops), стр. 37-43. IEEE, (2023)An Adaptive Service Placement Framework in Fog Computing Environment., и . ICACDS (1), том 1440 из Communications in Computer and Information Science, стр. 729-738. Springer, (2021)MuRanker: a mutant ranking tool., , , и . Softw. Test. Verification Reliab., 25 (5-7): 572-604 (2015)Implementing Key Management for Security in Ad Hoc Network., , , , и . HPAGC, том 169 из Communications in Computer and Information Science, стр. 485-489. Springer, (2011)