Author of the publication

An Energy-Efficient Ring Search Routing Protocol Using Energy Parameters in Path Selection.

, , , , , and . ICCASA, volume 109 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 72-85. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy set-based automatic bug triaging., , , and . ICSE, page 884-887. ACM, (2011)Statistical learning approach for mining API usage mappings for code migration., , , and . ASE, page 457-468. ACM, (2014)An L1-Regression Random Forests Method for Forecasting of Hoa Binh Reservoir's Incoming Flow.. KSE, page 360-364. IEEE, (2015)A New Feature Sampling Method in Random Forests for Predicting High-Dimensional Data., , , , and . PAKDD (2), volume 9078 of Lecture Notes in Computer Science, page 459-470. Springer, (2015)Fuzzy set approach for automatic tagging in evolving software., , , , and . ICSM, page 1-10. IEEE Computer Society, (2010)A Conditional Splitting Framework for Efficient Constituency Parsing., , , and . ACL/IJCNLP (1), page 5795-5807. Association for Computational Linguistics, (2021)DAMFormer: Enhancing Polyp Segmentation Through Dual Attention Mechanism., , , , , , and . ICONIP (4), volume 14450 of Lecture Notes in Computer Science, page 95-106. Springer, (2023)Recommending API Usages for Mobile Apps with Hidden Markov Model., , , and . ASE, page 795-800. IEEE Computer Society, (2015)A topic-based approach for narrowing the search space of buggy files from a bug report., , , , and . ASE, page 263-272. IEEE Computer Society, (2011)Complete and accurate clone detection in graph-based models., , , , and . ICSE, page 276-286. IEEE, (2009)