Author of the publication

Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks.

, , and . Communications, Internet, and Information Technology, page 181-186. IASTED/ACTA Press, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Executing tree routing algorithms on a high-performance pattern associative router., , and . J. Syst. Archit., 44 (11): 849-866 (1998)A Fault-Tolerant Memory-Based Cell for a Reconfigurable DSP Processor., and . VLSI, page 58-64. CSREA Press, (2003)H-Tree Interconnection Structure for Reconfigurable DSP Hardware., , and . ERSA, page 170-176. CSREA Press, (2004)Superpipelined reconfigurable hardware for DSP., and . ISCAS, IEEE, (2006)Hardened by Design Techniques for Implementing Multiple-Bit Upset Tolerant Static Memories., and . ISCAS, page 2786-2789. IEEE, (2007)BVE: a wafer-scale engine for differential equation computation., and . ICS, page 101-107. ACM, (1988)BASIS: A Biological Approach to System Information Security., , , , , , and . MMM-ACNS, volume 2052 of Lecture Notes in Computer Science, page 127-142. Springer, (2001)CNTFET SRAM cell with tolerance to removed metallic CNTs., and . MWSCAS, page 186-189. IEEE, (2012)Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks., , and . ICON, page 7-12. IEEE, (2007)An implemented, initialization algorithm for many-dimension, Monte Carlo circuit simulations using Spice., and . CCWC, page 1-4. IEEE, (2017)