Author of the publication

Towards reliable and lightweight communication in industrial wireless sensor networks.

, , , , and . INDIN, page 1218-1224. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Short-Packet Interleaver Against Impulse Interference in Practical Industrial Environments., , , , and . IEEE Trans. Wirel. Commun., 21 (12): 10257-10270 (2022)A Reassessment on Applying Protocol Interference Model Under Rayleigh Fading: From Perspective of Link Scheduling., , , and . IEEE/ACM Trans. Netw., 32 (1): 238-252 (February 2024)Low jitter scheduling for Industrial Wireless Sensor and Actuator Networks., , , and . IECON, page 5594-5599. IEEE, (2013)Mapping The Evolution of Scientific Community Structures in Time., , , and . WWW (Companion Volume), page 1039-1044. ACM, (2015)Increasing the Accuracy of Secure Model for Medical Data Sharing in the Internet of Things., , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 40-51. Springer, (2022)Afraid of Niche, Tired of Mass: Atypical Idea Combination on Crowdfunding Platform., , and . ICIS, Association for Information Systems, (2022)Towards reliable and lightweight communication in industrial wireless sensor networks., , , , and . INDIN, page 1218-1224. IEEE, (2012)Realization and measurements of industrial wireless sensor and actuator networks., , , and . CASE, page 131-137. IEEE, (2015)Theoretical Analysis of Secrecy Transmission Capacity in Wireless Ad Hoc Networks., , , and . WCNC, page 1-6. IEEE, (2017)Physical Layer Authentication Schemes Against Clone Node and Sybil Attacks in Wireless Industrial Internet., , , , and . ICII, page 381-386. IEEE, (2019)