Author of the publication

Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks.

, , , , , and . Workshop on Wireless Security, page 87-96. ACM, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Voice Spam Control with User Behavior Analysis., , and . HPCC, page 354-361. IEEE, (2009)Multi-level transaction model for semantic concurrency control in linear hash structures., , and . Inf. Softw. Technol., 42 (7): 445-464 (2000)AdaPool: An Adaptive Model-Free Ride-Sharing Approach for Dispatching using Deep Reinforcement Learning., , and . BuildSys@SenSys, page 304-305. ACM, (2020)Mobile data and transaction management., , , and . Inf. Sci., 141 (3-4): 279-309 (2002)A Hybrid Deep Reinforcement Learning Approach for Jointly Optimizing Offloading and Resource Management in Vehicular Networks., , , , and . IEEE Trans. Veh. Technol., 73 (2): 2456-2467 (2024)Novelty Detection and Adaptation: A Domain Agnostic Approach., , and . ISIC, volume 2786 of CEUR Workshop Proceedings, page 73-77. CEUR-WS.org, (2021)Crossfertilization Of DBMS Research With Other Disciplines Of Computer Science (Panel Discussion)., , , , and . ACM Annual Conference (1), page 325. ACM, (1978)Experiments in Adaptable and Secure Multimedia Database Systems (Invited Paper)., and . DEXA, volume 1677 of Lecture Notes in Computer Science, page 1096-1101. Springer, (1999)Adaptable Recovery Using Dynamic Quorum Assignments., and . VLDB, page 231-242. Morgan Kaufmann, (1990)A Dynamic majority determination algorithm for reconfiguration of network partitions., and . Inf. Sci., 46 (1-2): 27-45 (1988)