Author of the publication

Redeployment based sensing hole mitigation in wireless sensor networks.

, , and . WCNC, page 2278-2283. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RFID based indoor location determination for elderly tracking., and . SIU, page 1-4. IEEE, (2012)WCOT: A Realistic Lifetime Metric for the Performance Evaluation of Wireless Sensor Networks., and . PIMRC, page 1-5. IEEE, (2007)On the retrial and redial phenomena in GSM networks., , , and . WCNC, page 885-889. IEEE, (2000)Long Short-Term Network Based Unobtrusive Perceived Workload Monitoring with Consumer Grade Smartwatches in the Wild., , and . CoRR, (2019)Wireless sensor networks for intrusion detection: packet traffic modeling., , , and . IEEE Communications Letters, 10 (1): 22-24 (2006)Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks., , , and . ISCIS, volume 3280 of Lecture Notes in Computer Science, page 363-372. Springer, (2004)Surveillance with wireless sensor networks in obstruction: Breach paths as watershed contours., , , and . Comput. Networks, 54 (3): 428-441 (2010)Design and implementation of a QoS-aware MAC protocol for Wireless Multimedia Sensor Networks., , and . Comput. Commun., 34 (16): 1991-2001 (2011)How Laboratory Experiments Can Be Exploited for Monitoring Stress in the Wild: A Bridge Between Laboratory and Daily Life., , , , , and . Sensors, 20 (3): 838 (2020)Optimal two-tier cellular network design., and . ICCCN, page 312-317. IEEE, (1999)