Author of the publication

A Collaborative-Task Assignment Algorithm for Mobile Crowdsourcing in Opportunistic Networks.

, , and . ICC, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Ransomware using Support Vector Machines., , and . ICPP Workshops, page 1:1-1:6. ACM, (2018)Seed Selection Procedure for LFSR-Based Random Pattern Generators., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (12): 3063-3071 (2003)Analysis of Probabilistic Trapezoid Protocol for Data Replication., , , , and . Inf. Media Technol., 3 (3): 498-511 (2008)Electromagnetic Noise Tolerant Hybrid Communication Protocol for CANs., , , , and . PRDC, page 284-291. IEEE Computer Society, (2017)Hybrid BIST Using Partially Rotational Scan., , , , and . Asian Test Symposium, page 379-384. IEEE Computer Society, (2001)An Experimental Study on Latch Up Failure of CMOS LSI., , and . SSIRI, page 215-216. IEEE Computer Society, (2008)Analysis of Read and Write Availability for Generalized Hybrid Data Replication Protocol., , , , , and . PRDC, page 143-150. IEEE Computer Society, (2004)The effect of three-dimensional culture on the ameloblastic differentiation of dental epithelial cells., , , , , , , , and . MHS, page 1-2. IEEE, (2016)RFID Tag Grouping Protocols Made Private., , and . DSN Workshops, page 105-106. IEEE Computer Society, (2017)Test Data Compression of 100x for Scan-Based BIST., , , , , , , and . ITC, page 1-10. IEEE Computer Society, (2006)