Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strategies for Sensor Selection in Monitoring Toxic Chemical Diffusion Scenarios., , , and . SNA, page 7-12. ISCA, (2009)A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks, , , , , and . ACM Trans. Inf. Syst. Secur., 8 (2): 228--258 (2005)Mutual Information Based CT-MR Brain Image Registration Using Generalized Partial Volume Joint Histogram Estimation., and . IEEE Trans. Med. Imaging, 22 (9): 1111-1119 (2003)Mitigation of Byzantine attacks for target location estimation in wireless sensor networks., , and . CISS, page 1-6. IEEE, (2012)Algorithm-Hardware Co-Optimization of the Memristor-Based Framework for Solving SOCP and Homogeneous QCQP Problems., , , , , and . CoRR, (2018)Optimal Periodic Sensor Scheduling in Large-Scale Dynamical Networks, , , and . CoRR, (2013)Asynchronous hybrid maximum likelihood classification of linear modulations., , and . GLOBECOM, page 3235-3240. IEEE, (2013)A witness-based approach for data fusion assurance in wireless sensor networks., , , and . GLOBECOM, page 1435-1439. IEEE, (2003)Fault-Tolerance Analysis of a Wireless Sensor Network with Distributed Classification Codes., , , , , and . ISIT, page 217-221. IEEE, (2006)Signal Processing for Hyperspectral Data., , and . ICASSP (5), page 1181-1184. IEEE, (2006)