Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Randomized carrier-based sensor relocation in wireless sensor and robot networks., , , and . Ad Hoc Networks, 11 (7): 1951-1962 (2013)On a Proposed Divide-And-Conquer Minimal Spanning Tree Algorithm., and . BIT, 28 (4): 785-789 (1988)Fast and Scalable Counterfeits Estimation for Large-Scale RFID Systems., , , , and . IEEE/ACM Trans. Netw., 24 (2): 1052-1064 (2016)Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace., , and . IEEE Trans. Computers, 64 (1): 139-151 (2015)An Improved Stochastic Modeling of Opportunistic Routing in Vehicular CPS., , , , and . IEEE Trans. Computers, 64 (7): 1819-1829 (2015)Higher dimensional hexagonal networks., , , and . J. Parallel Distributed Comput., 63 (11): 1164-1172 (2003)Cost-Efficient Multicast Routing in Ad Hoc and Sensor Networks., and . Handbook of Approximation Algorithms and Metaheuristics (2), Chapman and Hall/CRC, (2018)Broadcast in Ad Hoc Networks., , and . Guide to Wireless Ad Hoc Networks, Springer, (2009)Generating n-Ary Reflected Gray Codes on a Linear Array of Processors.. Parallel Process. Lett., 6 (1): 27-34 (1996)An overview of Fog computing and its security issues., , , and . Concurr. Comput. Pract. Exp., 28 (10): 2991-3005 (2016)