Author of the publication

Energy Aware Routing Based on Adaptive Clustering Mechanism for Wireless Sensor Networks.

, , , , , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 1115-1124. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Identification of Bad Signatures in RSA-Type Batch Signature., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (1): 74-80 (2006)An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading., , and . IEICE Trans. Inf. Syst., 88-D (5): 1077-1081 (2005)Efficient parallel exponentiation in GF(2n) using normal basis representations., , , and . SPAA, page 179-188. ACM, (2001)EAR-RT: Energy Aware Routing with Real-Time Guarantee for Wireless Sensor Networks., , , , and . International Conference on Computational Science (4), volume 3994 of Lecture Notes in Computer Science, page 946-953. Springer, (2006)Linked Stack Buffer Management for Shared-Stacks., , , and . ICCSA (1), volume 5072 of Lecture Notes in Computer Science, page 811-819. Springer, (2008)Kckpt: An efficient checkpoint and recovery facility on unixware kernel., , , and . CATA, page 303-308. ISCA, (2000)Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture., , and . SEUS, volume 5287 of Lecture Notes in Computer Science, page 406-416. Springer, (2008)An On-Line Optimal Algorithm for Scheduling Soft Aperiodic Tasks in Hard Real-Time Systems., and . PDPTA, CSREA Press, (2000)On the Choice of Checkpoint Interval., , and . Applied Informatics, page 670-675. IASTED/ACTA Press, (2003)A fast mount mechanism for YAFFS2., , , , , , , and . SAC, page 1791-1795. ACM, (2012)