Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Close-packing-based sensor node deployment schemes for AOFSN., , , and . Int. J. Commun. Networks Distributed Syst., 7 (3/4): 311-330 (2011)BACO: A Bi-Ant-Colony-Based Strategy for UAV Trajectory Planning with Obstacle Avoidance., , , , and . MSN, page 279-286. IEEE, (2022)Study on Adaptive Intrusion Detection Engine Based on Gene Expression Programming Rules., , , and . CSSE (3), page 959-963. IEEE Computer Society, (2008)978-0-7695-3336-0.Hybrid No-Reference Video Quality Assessment Focusing on Codec Effects., , , and . KSII Trans. Internet Inf. Syst., 5 (3): 592-606 (2011)Avidity-model based clonal selection algorithm for network intrusion detection., , , , , and . IWQoS, page 1-5. IEEE, (2010)MPDC: A Multi-channel Pipelined Data Collection MAC for Duty-Cycled Linear Sensor Networks., , , and . WASA (2), volume 12938 of Lecture Notes in Computer Science, page 550-562. Springer, (2021)Cube-Based Intra-Datacenter Networks with LOBS-HC., , , and . ICC, page 1-6. IEEE, (2011)MEM: A Multi-Staged Eviction Mechanism of Flowtable for Software-Defined Datacenters., , , and . INFOCOM Workshops, page 400-405. IEEE, (2020)Sample Size Determination to Detect Cusp Catastrophe in Stochastic Cusp Catastrophe Model: A Monte-Carlo Simulation-Based Approach., , , and . SBP, volume 8393 of Lecture Notes in Computer Science, page 35-41. Springer, (2014)Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems., , , and . Sensors, 11 (7): 6743-6759 (2011)