Author of the publication

Distributed Center-Location Algorithms

, and . IEEE Journal on Selected Areas in Communications, 15 (3): 291-303 (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Algebraic Approach to Modeling in Software Engineering., and . AMAST, page 385-392. Springer, (1993)Designing an Agent Synthesis System for Cross-RPC Communication., and . IEEE Trans. Software Eng., 20 (3): 188-198 (1994)Combining ORAM with PIR to Minimize Bandwidth Costs., and . CODASPY, page 289-296. ACM, (2015)Efficient key establishment for group-based wireless sensor deployments., , and . Workshop on Wireless Security, page 1-10. ACM, (2005)Distributed Center-Location Algorithms: Proposals and Comparisons., and . INFOCOM, page 75-84. IEEE Computer Society, (1996)Spatial Hash-Joins., and . SIGMOD Conference, page 247-258. ACM Press, (1996)Hierarchical policy delegation in multiple-authority ABE., and . Int. J. Inf. Comput. Secur., 7 (2/3/4): 140-159 (2015)Dynamic Merkle Trees for Verifying Privileges in Sensor Networks., and . ICC, page 2276-2282. IEEE, (2006)DHCP Origin Traceback., , and . ICDCN, volume 6522 of Lecture Notes in Computer Science, page 394-406. Springer, (2011)Foisting and Stealing of Keys in Sensor Networks., and . EWSN, volume 7158 of Lecture Notes in Computer Science, page 49-64. Springer, (2012)