Author of the publication

Mitigation of Exposed Terminal Problem Using Packet Sensing.

, , and . CNSR, page 263-269. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating Collisions in Saturated Wireless Network with Receiver Token Ring., , and . SMC, page 4919-4923. IEEE, (2013)Prediction revision strategies for data transmission in wireless sensor networks., , and . CIT, page 827-832. IEEE Computer Society, (2008)Node localisation in wireless sensor network based on self-organising isometric embedding., , and . Enterprise IS, 2 (3): 259-273 (2008)Dynamic Threshold Scheme Used in Directed Diffusion., , and . ICESS, volume 3820 of Lecture Notes in Computer Science, page 220-229. Springer, (2005)Cluster Based Location-Aware Routing Protocol for Large Scale Heterogeneous MANET., , , and . IMSCCS, page 366-373. IEEE Computer Society, (2007)A SPT Based Topology Control Algorithm for Wireless Sensor Network., , and . SKG, page 282-285. IEEE Computer Society, (2007)An adaptive distributed localisation in wireless sensor network., , and . Enterprise IS, 3 (2): 117-132 (2009)Multi-scale Combination Prediction Model with Least Square Support Vector Machine for Network Traffic., , and . ISNN (3), volume 3498 of Lecture Notes in Computer Science, page 385-390. Springer, (2005)A Heuristic and Distributed QoS Route Discovery Method for Mobile Ad Hoc Networks., and . WAIM, volume 3739 of Lecture Notes in Computer Science, page 428-439. Springer, (2005)Intelligent Hierarchical Intrusion Detection System for Secure Wireless Ad Hoc Network., , , and . ISNN (3), volume 3498 of Lecture Notes in Computer Science, page 482-487. Springer, (2005)