Author of the publication

Dynamic Routing Algorithm for Reliability and Energy Efficiency in Wireless Sensor Networks.

, , , , , and . FGIT, volume 5899 of Lecture Notes in Computer Science, page 277-284. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks., , , , , and . AST/UCMA/ISA/ACN, volume 6059 of Lecture Notes in Computer Science, page 159-174. Springer, (2010)3DE: selective cluster head selection scheme for energy efficiency in wireless sensor networks., , and . PETRA, ACM, (2009)Opportunistic Cooperation Based on Delayed Retransmissions for a Multi-User Uplink System., and . VTC Fall, page 1-4. IEEE, (2008)RISA: A Real-Time Interactive Shadow Avatar., , and . ISM, page 112-122. IEEE Computer Society, (2007)Supervised low-rank semi-nonnegative matrix factorization with frequency regularization for forecasting spatio-temporal data., , , and . CoRR, (2023)3DE_var: Energy-Efficient Cluster-Based Routing Scheme in Wireless Sensor Networks., , and . KES-AMSTA, volume 5559 of Lecture Notes in Computer Science, page 314-324. Springer, (2009)Robust template matching using scale-adaptive deep convolutional features., , , , and . APSIPA, page 708-711. IEEE, (2017)Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract., , , , , and . AsiaCCS, page 617-628. ACM, (2016)A Robust Ensemble of ResNets for Character Level End-to-end Text Detection in Natural Scene Images., , and . CBMI, page 10:1-10:6. ACM, (2017)A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE., , , , and . ICISC, volume 10157 of Lecture Notes in Computer Science, page 51-74. (2016)