Author of the publication

Effective handling of spreading events using wireless sensor and actuator networks.

, , , and . IWCMC, page 476-482. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Calibration Methods for Uncontrolled Environments in Sensor Networks: A Reference Survey., , , and . CoRR, (2019)Fault-Tolerant Prediction-Based Scheme for Target Tracking Application., , , and . GLOBECOM, page 1-6. IEEE, (2009)Anonymous authentication scheme in e-Health Cloud environment., , , and . ICITST, page 47-52. IEEE, (2016)Solving the consensus problem in a mobile environment., , and . IPCCC, page 29-35. IEEE, (1999)Solving the consensus problem in a dynamic group: an approach suitable for a mobile environment., , and . ISCC, page 327-332. IEEE Computer Society, (2002)Slotted contention-based energy-efficient MAC protocols in delay-sensitive wireless sensor networks., , , and . ISCC, page 419-422. IEEE Computer Society, (2012)Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications., , , and . CODASPY, page 139-141. ACM, (2017)A seamless handoff protocol for hierarchical Mobile IPv4., and . MWCN, page 651-655. IEEE, (2002)A semantic based pre-fetch scheme for SMIL presentation proxy-delivery., and . MMM, IEEE, (2006)Data Dissemination and Power Management in Wireless Sensor Networks., , and . ACC (4), volume 193 of Communications in Computer and Information Science, page 593-607. Springer, (2011)