Author of the publication

P-MAC: A Cross-Layer Duty Cycle MAC Protocol Towards Pipelining for Wireless Sensor Networks.

, , , , and . ICC, page 1-5. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Centroid opposition with a two-point full crossover for the partially attracted firefly algorithm., , , and . Soft Comput., 23 (23): 12241-12254 (2019)Avidity-model based clonal selection algorithm for network intrusion detection., , , , , and . IWQoS, page 1-5. IEEE, (2010)Close-packing-based sensor node deployment schemes for AOFSN., , , and . Int. J. Commun. Networks Distributed Syst., 7 (3/4): 311-330 (2011)Hybrid No-Reference Video Quality Assessment Focusing on Codec Effects., , , and . KSII Trans. Internet Inf. Syst., 5 (3): 592-606 (2011)Software-Defined Mobile Networks Security., , , , and . Mob. Networks Appl., 21 (5): 729-743 (2016)BACO: A Bi-Ant-Colony-Based Strategy for UAV Trajectory Planning with Obstacle Avoidance., , , , and . MSN, page 279-286. IEEE, (2022)Study on Adaptive Intrusion Detection Engine Based on Gene Expression Programming Rules., , , and . CSSE (3), page 959-963. IEEE Computer Society, (2008)978-0-7695-3336-0.MPDC: A Multi-channel Pipelined Data Collection MAC for Duty-Cycled Linear Sensor Networks., , , and . WASA (2), volume 12938 of Lecture Notes in Computer Science, page 550-562. Springer, (2021)Cube-Based Intra-Datacenter Networks with LOBS-HC., , , and . ICC, page 1-6. IEEE, (2011)GEP-based Framework for Immune- Inspired Intrusion Detection., , , , and . KSII Trans. Internet Inf. Syst., 4 (6): 1273-1293 (2010)