Author of the publication

Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems.

, , and . Inf. Syst. Frontiers, 13 (4): 471-480 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Slow Start Backoff Algorithm for Ad-Hoc Wireless Networks., , and . GLOBECOM, page 1-5. IEEE, (2010)Guest Editorial: Theme Issue on Smartphone Applications and Services for Pervasive Computing, , , and . Personal and Ubiquitous Computing, 16 (6): 611-612 (2012)Flooding-limited for multi-constrained quality-of-service routing protocol in mobile ad hoc networks., , and . IET Commun., 2 (7): 972-981 (2008)A Proxy Mobile IPv6 Based Global Mobility Management Architecture and Protocol., , , , and . Mob. Networks Appl., 15 (4): 530-542 (2010)Markov-based Emergency Message Reduction Scheme for Roadside Assistance., , , , and . Mob. Networks Appl., 22 (5): 859-867 (2017)Automated Verification of Noninterference Property., , , , , and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 629-646. Springer, (2018)ITARS: trust-aware recommender system using implicit trust networks., , , , , and . IET Commun., 4 (14): 1709-1721 (2010)Privacy-Preserving Power Request in Smart Grid Networks., , , and . IEEE Syst. J., 8 (2): 441-449 (2014)Dynamic Resource Prediction and Allocation for Cloud Data Center Using the Multiobjective Genetic Algorithm., , , , and . IEEE Syst. J., 12 (2): 1688-1699 (2018)A forwarding strategy of counteracting redundancy data in named data networking., , , and . Int. J. Commun. Syst., 28 (18): 2289-2310 (2015)