Author of the publication

Relative Localization in Wireless Sensor Networks for Measurement of Electric Fields under HVDC Transmission Lines.

, , , , , and . Sensors, 15 (2): 3540-3564 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QuickSync: Improving Synchronization Efficiency for Mobile Cloud Storage Services., , , , and . MobiCom, page 592-603. ACM, (2015)Segmentation of dermoscopy images based on fully convolutional neural network., , , , and . ICIP, page 1732-1736. IEEE, (2017)S-Chord: Hybrid Topology Makes Chord Efficient., , , and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 480-487. Springer, (2005)Network coding based multipath TCP., , and . INFOCOM Workshops, page 25-30. IEEE, (2012)Low-Latency Networking: Architecture, Techniques, and Opportunities., , , , and . IEEE Internet Comput., 22 (5): 56-63 (2018)Robust and Adaptive Scheduling of Sequential Periodic Sensing for Cognitive Radios., , and . IEEE J. Sel. Areas Commun., 32 (3): 503-515 (2014)Dynamic Multiple-Threshold Call Admission Control Based on Optimized Genetic Algorithm in Wireless/Mobile Networks., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (7): 1597-1608 (2008)State management in IPv4 to IPv6 transition., , , , , and . IEEE Netw., 29 (6): 48-53 (2015)Tunnel-Based IPv6 Transition., , , , , , and . IEEE Internet Comput., 17 (2): 62-68 (2013)Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control., , , , , and . AsiaCCS, page 59-70. ACM, (2016)