Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-agent Coordination Mechanism in Distributed Environment., and . EDCIS, volume 2480 of Lecture Notes in Computer Science, page 444-455. Springer, (2002)SDN-Based Routing for Efficient Message Propagation in VANET., , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 788-797. Springer, (2015)A Cluster-Based Secure Synchronization Protocol for Underwater Wireless Sensor Networks., , , and . IJDSN, (2014)Towards Robust Routing in Three-Dimensional Underwater Wireless Sensor Networks., , , and . IJDSN, (2013)A Recovery Approach for SQLite History Recorders from YAFFS2., , , , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 295-299. Springer, (2013)A Resource Reservation Protocol for Mobile Cellular Networks., , and . ISPA, volume 3358 of Lecture Notes in Computer Science, page 534-543. Springer, (2004)Discovery of Important Crossroads in Road Network using Massive Taxi Trajectories., , , , , , and . CoRR, (2014)Using multiple unmanned aerial vehicles to maintain connectivity of MANETs., , , , and . ICCCN, page 1-7. IEEE, (2014)An Image Cipher Based on Latin Cubes., and . ICICT, page 160-168. IEEE, (2020)Multiview pedestrian localisation via a prime candidate chart based on occupancy likelihoods., , and . ICIP, page 2334-2338. IEEE, (2017)