Author of the publication

A Greedy Approach for Coverage Hole Detection and Restoration in Wireless Sensor Networks.

, and . Wireless Personal Communications, 101 (1): 75-86 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low-power VLSI synthesis of DSP systems., , and . Integr., 36 (1-2): 41-54 (2003)Real-time Visualization of Concurrent Processes.. CONPAR, volume 457 of Lecture Notes in Computer Science, page 852-862. Springer, (1990)Adaptively Grouped Multilevel Space-Time Trellis Codes Combined with Beamforming and Component Code Selection., and . Wireless Personal Communications, 77 (4): 2549-2563 (2014)Parametric Analysis of a Novel Architecture of Phase Locked Loop for Communication System., and . Wireless Personal Communications, 77 (2): 1271-1285 (2014)A Greedy Approach for Coverage Hole Detection and Restoration in Wireless Sensor Networks., and . Wireless Personal Communications, 101 (1): 75-86 (2018)A Tunable Heterodyne Filter Design On Reconfigurable Fabric., , and . Journal of Circuits, Systems, and Computers, 13 (5): 981-998 (2004)When is an obstacle a perfect obstacle., , and . IEEE Trans. Robotics Autom., 14 (3): 497-503 (1998)Bandwidth allocation and distributed relay selection for multiple-user and multiple-relay cooperative systems using Stackelberg game., and . Int. J. Commun. Syst., (2018)Thinking cloud-enabled adept and agile supply chain for SMEs: a conceptual study., and . Int. J. Bus. Inf. Syst., 19 (3): 342-365 (2015)A Semi-Blind Watermarking Scheme for RGB Image Using Curvelet Transform, , and . International Journal on Foundations of Computer Science & Technology (IJFCST), 7 (1): 12 (2017)