Author of the publication

CLUSMA: a mobile agent based clustering middleware for wireless sensor networks.

, , , , and . FIT, page 63:1-63:4. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins., , and . GraMSec@FLoC, volume 11086 of Lecture Notes in Computer Science, page 1-12. Springer, (2018)A methodology for image annotation of human actions in videos., , , , and . Multim. Tools Appl., 79 (33-34): 24347-24365 (2020)Deep-Confidentiality: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data., , , , , and . ACM Trans. Internet Techn., 22 (2): 42:1-42:21 (2022)Aligning Research Resource and Researcher Representation: The eagle-i and VIVO Use Case., , , , , , , , , and . ICBO, volume 833 of CEUR Workshop Proceedings, CEUR-WS.org, (2011)Secure Logging as a Service Using Reversible Watermarking., , , , and . FNC/MobiSPC, volume 110 of Procedia Computer Science, page 336-343. Elsevier, (2017)Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE., , , and . ARES, page 400-407. IEEE Computer Society, (2007)Matchmaking Engine for Energy Data Marketplace Using Word Embedding Techniques., , , , and . ICE/ITMC, page 1-7. IEEE, (2023)A Fault Tolerant Approach for Malicious URL Filtering., , , and . ISNCC, page 1-6. IEEE, (2018)Decentralised computer systems. University of Cambridge, UK, (2021)British Library, EThOS.Blockchain based general data protection regulation compliant data breach detection system., , , , and . PeerJ Comput. Sci., (2024)