Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deploying wireless sensors to achieve both coverage and connectivity., , , , and . MobiHoc, page 131-142. ACM, (2006)A dynamic geographic hash table for data-centric storage in sensor networks., , , and . WCNC, page 2168-2174. IEEE, (2006)A Routing Protocol for Anycast Messages., , , and . IEEE Trans. Parallel Distributed Syst., 11 (6): 571-588 (2000)MosaicOS: A Simple and Effective Use of Object-Centric Images for Long-Tailed Object Detection., , , , , , , and . ICCV, page 407-417. IEEE, (2021)Modeling and Detection of Camouflaging Worm, , , , and . IEEE Transactions on Dependable and Secure Computing, (2010)Turning heterogeneity into an advantage in wireless ad-hoc network routing., , and . Ad Hoc Networks, 8 (1): 108-118 (2010)Robust object tracking in the X-Z domain., , and . MFI, page 499-504. IEEE, (2016)Pattern mutation in wireless sensor deployment., , , , and . IEEE/ACM Trans. Netw., 20 (6): 1964-1977 (2012)Integrated routing algorithms for anycast messages., , and . IEEE Commun. Mag., 38 (1): 48-53 (2000)Discovering the Unknown Knowns: Turning Implicit Knowledge in the Dataset into Explicit Training Examples for Visual Question Answering., , , and . EMNLP (1), page 6346-6361. Association for Computational Linguistics, (2021)