Author of the publication

Bandwidth-aware breach-free barrier construction with VANET nodes for realtime fugitive search.

, , , , , and . MILCOM, page 1021-1026. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spotlight SAR Processor by using Extended Frequency Scaling., , , and . IGARSS (4), page 629-632. IEEE, (2009)ICN-OMF: A control, management framework for Information-Centric Network testbed., , , and . ICOIN, page 416-417. IEEE Computer Society, (2015)Guest Editorial: Special Issue on Combinatorial Optimization and Applications., and . Algorithmica, 80 (6): 1769-1770 (2018)An Augmented Reality Processor with a Congestion-Aware Network-on-Chip Scheduler., , , , , , , and . IEEE Micro, 34 (6): 31-41 (2014)Towards developing a trust-based security solution., , , and . SAC, page 2204-2205. ACM, (2009)A note on decay rates of solutions to a system of cubic nonlinear Schrödinger equations in one space dimension.. Asymptot. Anal., 98 (1-2): 79-90 (2016)Privacy aware incentive mechanism to collect mobile data while preventing duplication., , , , , and . MILCOM, page 1242-1247. IEEE, (2015)A Dominating Set Based Approach to Identify Effective Leader Group of Social Network., , , , and . COCOON, volume 7936 of Lecture Notes in Computer Science, page 841-848. Springer, (2013)A New Localized Geometric Routing with Guaranteed Delivery on 3-D Wireless Networks., , , and . ICCCN, page 1-7. IEEE, (2012)Social Relation Based Long-Term Vaccine Distribution Planning to Suppress Pandemic., , , , , and . CSoNet, volume 9197 of Lecture Notes in Computer Science, page 26-34. Springer, (2015)