Author of the publication

Efficient and scalable multi-geography route planning.

, , , and . EDBT, volume 426 of ACM International Conference Proceeding Series, page 394-405. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Game Theoretic Approach for Power Aware Middleware., and . Middleware, volume 3231 of Lecture Notes in Computer Science, page 417-438. Springer, (2004)CCD: Efficient Customized Content Dissemination in Distributed Publish/Subscribe., , , and . Middleware, volume 5896 of Lecture Notes in Computer Science, page 62-82. Springer, (2009)Heuristics for Flash-Dissemination in Heterogenous Networks., , and . HiPC, volume 4297 of Lecture Notes in Computer Science, page 607-618. Springer, (2006)iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage., , , , and . EDBT, volume 261 of ACM International Conference Proceeding Series, page 710-714. ACM, (2008)Towards Reliable Application Data Broadcast in Wireless Ad Hoc Networks., , , , and . WCNC, page 4063-4068. IEEE, (2007)Information Collection Services for QoS-Aware Mobile Applications., and . IEEE Trans. Mob. Comput., 5 (5): 518-535 (2006)QoS-Aware Resource Discovery in Mobile Environments., , , and . The Handbook of Mobile Middleware, Auerbach Publications/CRC, (2006)gVault: A Gmail Based Cryptographic Network File System., , , , and . DBSec, volume 4602 of Lecture Notes in Computer Science, page 161-176. Springer, (2007)Heat-aware transmission strategies., , and . ITA, page 154-162. IEEE, (2015)CANOPY: A Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes., , , , and . ACM Trans. Cyber Phys. Syst., 5 (1): 3:1-3:34 (2021)