Author of the publication

Maximizing the Network Lifetime by Using PACO Routing Algorithm in Wireless Sensor Networks.

, , , , and . CWSN, volume 418 of Communications in Computer and Information Science, page 155-165. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Layered Negotiation-Based Self-protection for Wireless Sensor Networks.. CWSN, volume 501 of Communications in Computer and Information Science, page 302-310. Springer, (2014)A Joint Duty Cycle and Network Coding MAC Protocol for Underwater Wireless Sensor Networks., , , , , , and . ICCCN, page 1-9. IEEE, (2016)TEES: topology-aware execution environment service for fast and agile application deployment in HPC., , , , , and . Frontiers Inf. Technol. Electron. Eng., 23 (11): 1631-1645 (2022)Short-Length Raptor Codes for Mobile Free-Space Optical Channels., and . ICC, page 1-5. IEEE, (2009)Convolutional Network Coding based on Systematic RS Code for Low-latency Guarantee., , , and . ComComAP, page 232-237. IEEE, (2021)Local Optimum Algorithms for Self-Protection in Wireless Sensor Networks., , and . MSN, page 57-61. IEEE Computer Society, (2009)Mscnet: Mask stepwise calibration network for camouflaged object detection., , , and . J. Supercomput., 80 (16): 24718-24737 (November 2024)Maximizing the Network Lifetime by Using PACO Routing Algorithm in Wireless Sensor Networks., , , , and . CWSN, volume 418 of Communications in Computer and Information Science, page 155-165. Springer, (2013)Monitoring Wireless Sensor Networks Using a Model-Aided Approach., , , and . Networking, volume 3976 of Lecture Notes in Computer Science, page 1210-1215. Springer, (2006)Context-Aware Adaptation for Media Delivery in Pervasive Computing Environment., , , , , and . GPC, volume 3947 of Lecture Notes in Computer Science, page 634-643. Springer, (2006)