Author of the publication

Mining Linguistic Mobility Patterns for Wireless Networks.

, , and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 1352-1358. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient wavelet-tree-based watermarking method., , , , , and . Expert Syst. Appl., 38 (12): 14357-14366 (2011)RFID-Based System on Emergency Medical Care., , , , , , and . PAAP, page 6-11. IEEE, (2018)A New Concurrent Detection of Control Flow Errors Based on DCT Technique., , , , and . PRDC, page 201-209. IEEE Computer Society, (2007)Enhancement of Generalized Ring Signatures with Convertibility., and . ISBAST, page 71-76. IEEE Computer Society, (2012)A Blind Watermarking Scheme Based on Wavelet Tree Quantization., , and . SSIRI, page 89-95. IEEE Computer Society, (2008)A new generalized software complexity metric for distributed programs., and . Inf. Softw. Technol., 40 (5-6): 259-269 (1998)Efficient Parallel Algorithms for Hierarchical Clustering on Arrays with Reconfigurable Optical Buses., , and . J. Parallel Distributed Comput., 60 (9): 1137-1153 (2000)On the design of secure group-oriented communication channels in Internet environments., and . PIMRC, page 1243-1247. (1996)Data Hiding Using Flexible Multi-bit MER., , , and . ISBAST, page 24-31. IEEE, (2013)Mining Linguistic Mobility Patterns for Wireless Networks., , and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 1352-1358. Springer, (2005)