Author of the publication

A decentralized social algorithm for committee coordination problem.

, , , and . ISADS, page 345-351. IEEE Computer Society, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IDADET: Iterative Double-Sided Auction-Based Data-Energy Transaction Ecosystem in Internet of Vehicles., , , , , and . IEEE Internet Things J., 10 (11): 10113-10130 (June 2023)Agent-based Framework for Developing Distributed Systems., , and . CIKM Information Agents Workshop, page 20:1-20:3. (1995)Development of a Monitoring System Based on Power Consumption., , , , , , and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 363-372. Springer, (2017)Integrated Support Environment for Concurrent Process Calculi., , and . PODC, page 395. ACM, (1994)An Efficient Flow Control Approach For TCP Over Wireless Networks., , and . Journal of Circuits, Systems, and Computers, 13 (2): 341-360 (2004)An Intelligent Prediction Based Approach for Mobility Tracking in PCN., , and . International Conference on Internet Computing (1), page 528-534. CSREA Press, (2001)A growing network that optimizes between undertraining and overtraining., , , and . ICNN, page 1116-1120. IEEE, (1995)Neural networks for solving constrained Steiner tree problem., , and . ICNN, page 1867-1870. IEEE, (1995)Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files., , , , , , , and . NBiS, volume 1036 of Advances in Intelligent Systems and Computing, page 305-316. Springer, (2019)Visitor Access Control Scheme Utilizing Social Relationship in the Real World., , , , , and . IFIPTM, volume 321 of IFIP Advances in Information and Communication Technology, page 95-107. Springer, (2010)