Author of the publication

Autonomous Management of Large-Scale Ubiquitous Sensor Networks.

, , , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 609-618. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-Filtering System to Avoid Total Data Distortion in IoT Networking., , and . Symmetry, 9 (1): 16 (2017)A New Optimization Technique for Crane Mechanism Design., , , , , and . Modelling, Simulation, and Optimization, page 136-140. IASTED/ACTA Press, (2003)ACESS: Adaptive Channel Estimation and Selection Scheme for Coexistence Mitigation in WBANs., , , and . IMCOM, page 96:1-96:4. ACM, (2016)A regional cell routing in wireless sensor networks., and . ICUIMC, page 425-429. ACM, (2008)OCDP: a WBAN MAC protocol for contention-based medical and CE applications., , , and . ICUIMC, page 12. ACM, (2010)A Methodology for Object Identification and Tracking in Construction Based on Spatial Modeling and Image Matching Techniques., , and . Comput. Aided Civ. Infrastructure Eng., 24 (3): 199-211 (2009)The impact of cloud base station's coordinated multi-point schemes on mobility performance., , , and . ICTC, page 660-665. IEEE, (2012)Moving object detection in omnidirectional vision-based mobile robot., , , and . IECON, page 4232-4235. IEEE, (2012)Modeling BPEL-Based Collaborations with Heterogeneous IoT Devices., , , , and . DASC, page 289-294. IEEE Computer Society, (2014)Protection Against Format String Attacks by Binary Rewriting., , , , , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 303-308. Springer, (2005)