Author of the publication

Redeployment based sensing hole mitigation in wireless sensor networks.

, , and . WCNC, page 2278-2283. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Long Short-Term Network Based Unobtrusive Perceived Workload Monitoring with Consumer Grade Smartwatches in the Wild., , and . CoRR, (2019)Surveillance with wireless sensor networks in obstruction: Breach paths as watershed contours., , , and . Comput. Networks, 54 (3): 428-441 (2010)Design and implementation of a QoS-aware MAC protocol for Wireless Multimedia Sensor Networks., , and . Comput. Commun., 34 (16): 1991-2001 (2011)Sleep quality monitoring with ambient and mobile sensing., , and . SIU, page 507-510. IEEE, (2015)Exploring the effects of monitoring and flow-rule timeout durations on load balancing in software defined networks., , and . SIU, page 1493-1496. IEEE, (2015)Optimal two-tier cellular network design., and . ICCCN, page 312-317. IEEE, (1999)Topological Design of Interconnected LAN-MAN Networks., and . INFOCOM, page 2260-2269. IEEE Computer Society, (1992)A Unified Model for Human Behavior Modeling Using a Hierarchy with a Variable Number of States., , , , and . ICPR, page 3804-3809. IEEE Computer Society, (2014)Sensor Log: A mobile data collection and annotation application., , , and . SIU, page 1375-1378. IEEE, (2014)Fault tolerant data plane using SDN., , , and . SIU, page 1-4. IEEE, (2017)