Author of the publication

Identification and Validation of Spatio-Temporal Associations in Wireless Sensor Networks

, , and . Sensor Technologies and Applications, International Conference on, (2009)
DOI: http://doi.ieeecomputersociety.org/10.1109/SENSORCOMM.2009.83

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource Management in the Next-Generation Integrated WLAN / 3G Cellular Networks., , , and . WCNC, page 3341-3346. IEEE, (2007)Game theoretic modeling of security and trust relationship in cyberspace., , and . Int. J. Commun. Syst., 29 (9): 1500-1512 (2016)A modular methodology to verify communication protocols., and . Comput. Commun., 20 (12): 1069-1077 (1997)A Distributed Multicast Routing Protocol for Real-Time Multicast Applications., , , and . Comput. Networks, 31 (1-2): 101-110 (1999)A context-aware prefetching strategy for mobile computing environments., , , and . IWCMC, page 1109-1116. ACM, (2006)Fair Queueing Based Packet Scheduling for Buffered Crossbar Switches., , and . GLOBECOM, page 1-6. IEEE, (2009)Identification and Validation of Spatio-Temporal Associations in Wireless Sensor Networks, , and . Sensor Technologies and Applications, International Conference on, (2009)Using Logical Rings to solve the Mutual Exclusion Problem in Distributed Memory Systems., , , and . PDPTA, page 1229-1238. CSREA Press, (1997)An Efficient Distributed Mutual Exclusion Algorithm., , , , and . ICPP, Vol. 1, page 196-203. IEEE Computer Society, (1996)Mobile Agents to Automate Fault Management in Wireless and Mobile Networks., , and . IPDPS Workshops, volume 1800 of Lecture Notes in Computer Science, page 1296-1300. Springer, (2000)