Author of the publication

Oceanic Forcing of Sahel Rainfall on Interannual to Interdecadal Time Scales

, , and . Science, 302 (5647): 1027--1030 (Nov 7, 2003)
DOI: 10.1126/science.1089357

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selfish node detection based on evidence by trust authority and selfish replica allocation in DANET., and . Int. J. Inf. Commun. Technol., 9 (4): 473-491 (2016)Comparison of Deep Feature Classification and Fine Tuning for Breast Cancer Histopathology Image Classification., , , and . RTIP2R (2), volume 1036 of Communications in Computer and Information Science, page 58-68. Springer, (2018)A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks., , , , , , , and . Wirel. Pers. Commun., 93 (2): 383-407 (2017)TRIZ Tool for Optimization of Airport Runway., , and . IFIP CAI, volume 304 of IFIP Advances in Information and Communication Technology, page 80-88. Springer, (2009)Development of an Eco-Friendly Electrical Discharge Machine (E-EDM) Using TRIZ Approach., and . IFIP CAI, volume 304 of IFIP Advances in Information and Communication Technology, page 242-248. Springer, (2009)Trust Based Routing to Improve Network Lifetime of Mobile Ad Hoc Networks., , and . J. Comput. Inf. Technol., 21 (3): 149-160 (2013)Multiobjective trajectory planner for industrial robots with payload constraints., , and . Robotica, 26 (6): 753-765 (2008)Evolutionary multi-criteria trajectory modeling of industrial robots in the presence of obstacles., , and . Eng. Appl. Artif. Intell., 22 (2): 329-342 (2009)A swarm intelligence-based approach for addressing network partitioning constraints in mobile ad hoc networks., and . Int. J. Commun. Networks Distributed Syst., 14 (2): 164-184 (2015)An Agent Based Security Framework for Protecting Routing Layer Operations in MANET., , and . NetCoM, page 381-385. IEEE Computer Society, (2009)