Author of the publication

Performance Evaluation of Reactive and Proactive Protocols for Ad-Hoc Sensor Networks Using Different Radio Models.

, , , , and . J. Interconnect. Networks, 8 (4): 387-405 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A web-based e-learning system for increasing study efficiency by stimulating learner's motivation., , , and . Inf. Syst. Frontiers, 8 (4): 297-306 (2006)Requirements for Trustworthy Artificial Intelligence - A Review., , and . NBiS, volume 1264 of Advances in Intelligent Systems and Computing, page 105-115. Springer, (2020)Priority Based Wireless Communications for Health Monitoring on Highways., , and . J. Interconnect. Networks, 9 (4): 337-349 (2008)Performance Evaluation of Reactive and Proactive Protocols for Ad-Hoc Sensor Networks Using Different Radio Models., , , , and . J. Interconnect. Networks, 8 (4): 387-405 (2007)Artificial intelligence control for trust-based detection of attackers in 5G social networks., , , and . Comput. Intell., (February 2024)Trustworthy AI Explanations as an Interface in Medical Diagnostic Systems., , and . NBiS, volume 526 of Lecture Notes in Networks and Systems, page 119-130. Springer, (2022)Adaptive Coordination Protocol for Heterogeneous Wireless Networks., and . ICC, page 4805-4810. IEEE, (2007)Economically Viable Support for Internet Mobility., , and . ICC, page 1-6. IEEE, (2011)A P2P system based on JXTA-overlay and its application for end-device control., , , , , and . MoMM, page 364-369. ACM, (2008)Analysis of ad-hoc networks connectivity considering shadowing radio model., , , , , and . MoMM, page 464-468. ACM, (2009)