From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security and Pseudo-Anonymity with a Cluster-Based Approach for MANET., и . GLOBECOM, стр. 1956-1961. IEEE, (2008)Protocol Validation: A Parallel Technique to Reduce the Reachability Tree.. PARLE, том 817 из Lecture Notes in Computer Science, стр. 109-121. Springer, (1994)Dynamic Access Control and Trust Management for Blockchain-Empowered IoT., , , , и . IEEE Internet Things J., 9 (15): 12997-13009 (2022)Dynamical grouping model for distributed real time causal ordering., и . Comput. Commun., 25 (3): 288-302 (2002)Optimal proactive monitor placement & scheduling for IoT networks., , , , и . J. Oper. Res. Soc., 73 (11): 2431-2450 (2022)Toward Safer Vehicular Transit: Implementing Deep Learning on Single Channel EEG Systems for Microsleep Detection., , , , и . IEEE Trans. Intell. Transp. Syst., 24 (1): 1052-1061 (января 2023)A2L: Angle to Landmarks Based Method Positioning for Wireless Sensor Networks., , и . ICC, стр. 3301-3306. IEEE, (2007)HA-A2L: angle to landmark-based high accuracy localization method in sensor networks., , и . IWCMC, стр. 475-480. ACM, (2007)Energy and mobility aware clustering technique for multicast routing protocols in wireless ad hoc networks., , и . WCNC, стр. 2150-2155. IEEE, (2009)UAV-Assisted Multi-Access Edge Computing: Technologies and Challenges., , , и . IEEE Internet Things Mag., 4 (4): 12-17 (2021)