Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Routing algorithms in Ad-hoc Networks., , and . International Conference on Internet Computing, page 983-990. CSREA Press, (2002)A Framework For Policy Based Coordinated Adaptation in Mobile Systems., , and . International Conference on Wireless Networks, page 969-974. CSREA Press, (2004)Attribute Weighting: A Method of Applying Domain Knowledge in the Decision Tree Process., , and . CIKM, page 259-266. ACM, (1998)On Peer-to-Peer Location Management in Vehicular Ad Hoc Networks., , , , and . Int. J. Interdiscip. Telecommun. Netw., 1 (2): 28-45 (2009)Game theoretic analysis of users and providers behavior in network under scarce resources., , , , and . ICNC, page 1149-1155. IEEE Computer Society, (2012)In-Network Trajectory Privacy Preservation., , , , , and . ACM Comput. Surv., 48 (2): 23:1-23:29 (2015)Using Candlestick Charting and Dynamic Time Warping for Data Behavior Modeling and Trend Prediction for MWSN in IoT., , , and . IEEE BigData, page 2884-2889. IEEE, (2018)Virtual Sensor for Mobile Sensor Data Cleaning., and . GLOBECOM, page 1-5. IEEE, (2010)Sketch-based data recovery in sensor data streams., , and . ICON, page 1-6. IEEE, (2013)The secure model for enterprise connectivity., , and . ICCCN, page 176-182. IEEE, (2000)