From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Demonstrating the Threat of Hardware Trojans in Wireless Sensor Networks., , и . ICCCN, стр. 1-8. IEEE, (2015)Examining the Feasibility of Reconfigurable Models for Molecular Dynamics Simulation., , и . ICA3PP, том 5022 из Lecture Notes in Computer Science, стр. 109-120. Springer, (2008)Power Management in Wireless Ad Hoc Networks Using AODV., , и . SNPD, стр. 436-443. IEEE Computer Society, (2005)A genetic algorithm-based method for feature subset selection., , , и . Soft Comput., 12 (2): 111-120 (2008)Internet service via UAV: user centric comprehensive attack surface analysis., , и . S3@MobiCom, стр. 1-2. ACM, (2021)Lifetime and Full-View Coverage Guarantees Through Distributed Algorithms in Camera Sensor Networks., и . IPDPS Workshops, стр. 1245-1250. IEEE Computer Society, (2017)Efficient Simulation of the Acyclic DR-Mesh on the LR-Mesh., , , и . IPDPS, IEEE Computer Society, (2004)A Three-Stage Heuristic Combined Genetic Algorithm Strategy to the Channel-Assignment Problem., , , и . IPDPS, стр. 145. IEEE Computer Society, (2003)SyD: A Middleware Testbed for Collaborative Applications over Small Heterogeneous Devices and Data Stores., , , , , , , , , и 8 other автор(ы). Middleware, том 3231 из Lecture Notes in Computer Science, стр. 352-371. Springer, (2004)Attacking Beacon-Enabled 802.15.4 Networks., , , и . SecureComm, том 50 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 253-271. Springer, (2010)