Author of the publication

Constructing Disjoint Paths for Secure Communication.

, , , and . DISC, volume 2848 of Lecture Notes in Computer Science, page 181-195. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relating Web pages to enable information-gathering tasks, and . CoRR, (2008)Towards Characterization of Actor Evolution and Interactions in News Corpora., , , and . ECIR, volume 4956 of Lecture Notes in Computer Science, page 422-429. Springer, (2008)Complex Network Characteristics and Team Performance in the Game of Cricket., , and . BDA, volume 8302 of Lecture Notes in Computer Science, page 133-150. Springer, (2013)Connectivity of a Dense Mesh of Randomly Oriented Directional Antennas Under a Realistic Fading Model., , , and . ALGOSENSORS, volume 9536 of Lecture Notes in Computer Science, page 13-26. Springer, (2015)The rich and middle classes on Twitter: Are popular users indeed different from regular users?, , , and . Comput. Commun., (2016)Deterministic Sampling and Range Counting in Geometric Data Streams, , , and . CoRR, (2003)Optimal Radius for Connectivity in Duty-Cycled Wireless Sensor Networks., , , and . ACM Trans. Sens. Networks, 11 (2): 36:1-36:37 (2015)Lecture notes: Efficient approximation of kernel functions.. CoRR, (2020)Hierarchical Neighbor Graphs: A Topology Control Mechanism for Data Collection in Heterogeneous Wireless Sensor Networks., , , and . Ad Hoc Sens. Wirel. Networks, 26 (1-4): 171-191 (2015)Sparse power-efficient topologies for wireless ad hoc sensor networks. CoRR, (2008)