Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards augmented connectivity in federated wireless sensor networks., , and . WCNC, page 1882-1886. IEEE, (2012)Placement of multiple mobile data collectors in underwater acoustic sensor networks., , and . Wirel. Commun. Mob. Comput., 8 (8): 1011-1022 (2008)On Secure and Power-Efficient RFID-Based Wireless Body Area Network., and . NSS, volume 7873 of Lecture Notes in Computer Science, page 770-776. Springer, (2013)Using neighbor and tag estimations for redundant reader eliminations in RFID networks., , and . WCNC, page 832-837. IEEE, (2011)Performance analysis of contention access period of IEEE 802.15.3 MAC protocol., , and . Int. J. Ad Hoc Ubiquitous Comput., 13 (3/4): 158-166 (2013)A Review of Tags Anti-collision and Localization Protocols in RFID Networks., , , and . J. Medical Systems, 36 (6): 4037-4050 (2012)Energy-aware task allocation over MANETs., , and . WiMob (3), page 315-322. IEEE, (2005)0-7803-9181-0.Discrete power-based Distance Clustering for anti-collision schemes in RFID systems.. LCN Workshops, page 868-873. IEEE Computer Society, (2013)Optimized relay placement for wireless sensor networks federation in environmental applications., , , and . Wirel. Commun. Mob. Comput., 11 (12): 1677-1688 (2011)Set-Cover Approximation Algorithms for Load-Aware Readers Placement in RFID Networks., , and . ICC, page 1-6. IEEE, (2011)