Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Node Cooperation in Mobile Ad Hoc Network., and . J. Networks, 8 (3): 645-649 (2013)Preference-Function Algorithm: a novel approach for selection of the users' preferred websites., , , and . Int. J. Bus. Intell. Data Min., 2 (3): 328-346 (2007)Maximizing lifetime of sensor surveillance systems., , , , , and . IEEE/ACM Trans. Netw., 15 (2): 334-345 (2007)Flooding isolated region reassignment., , and . GrC, page 361-364. IEEE, (2006)Multiconstrained QoS Routing: A Norm Approach., and . IEEE Trans. Computers, 56 (6): 859-863 (2007)An Efficient and Robust Routing Protocol for Data Aggregation., , and . WASA, volume 4138 of Lecture Notes in Computer Science, page 175-186. Springer, (2006)An Indexing Structure for Mobile Objects Utilizing Late Update., , and . ITNG, page 162-167. IEEE Computer Society, (2010)Algorithm and Theory for Robust Wireless Sensor Networks 2014., , , , , and . IJDSN, (2015)Why it is Hard to Fight against Cyber Criminals?, , , and . ICDCS Workshops, page 537-541. IEEE Computer Society, (2012)Utilizing Intelligent Middleware for Reconfiguration of Applications on Android., , , and . ICHIT (1), volume 6935 of Lecture Notes in Computer Science, page 81-89. Springer, (2011)