Author of the publication

Visualisation of wormholes in underwater sensor networks: a distributed approach.

, , , and . Int. J. Secur. Networks, 3 (1): 10-23 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-level transaction model for semantic concurrency control in linear hash structures., , and . Inf. Softw. Technol., 42 (7): 445-464 (2000)Mobile data and transaction management., , , and . Inf. Sci., 141 (3-4): 279-309 (2002)AdaPool: An Adaptive Model-Free Ride-Sharing Approach for Dispatching using Deep Reinforcement Learning., , and . BuildSys@SenSys, page 304-305. ACM, (2020)A Hybrid Deep Reinforcement Learning Approach for Jointly Optimizing Offloading and Resource Management in Vehicular Networks., , , , and . IEEE Trans. Veh. Technol., 73 (2): 2456-2467 (2024)Adaptable Recovery Using Dynamic Quorum Assignments., and . VLDB, page 231-242. Morgan Kaufmann, (1990)A Dynamic majority determination algorithm for reconfiguration of network partitions., and . Inf. Sci., 46 (1-2): 27-45 (1988)Performance Evaluation of the Optimistic Approach to Distributed Database Systems and Its Comparison to Locking.. ICDCS, page 508-517. IEEE Computer Society, (1982)The Pudding of Trust, , , , , , , , , and 2 other author(s). IEEE Intelligent Systems, 19 (5): 74--88 (2004)Crossfertilization Of DBMS Research With Other Disciplines Of Computer Science (Panel Discussion)., , , , and . ACM Annual Conference (1), page 325. ACM, (1978)Novelty Detection and Adaptation: A Domain Agnostic Approach., , and . ISIC, volume 2786 of CEUR Workshop Proceedings, page 73-77. CEUR-WS.org, (2021)