Author of the publication

A Tutorial Survey on Delivery of Service Data in Vehicular Ad-Hoc Networks.

, , , , , and . UIC/ATC/ScalCom, page 1417-1424. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network quantification despite biased labels., , and . MLG@KDD, page 147-154. ACM, (2010)A 3D spatial data model of the solar rights associated with individual residential properties., , , , , and . Comput. Environ. Urban Syst., (2019)Efficiency Based Adaptive Local Refinement for First-Order System Least-Squares Formulations., , , , , and . SIAM J. Sci. Comput., 33 (1): 1-24 (2011)Using camouflaging mobility to protect privacy in mobile ad hoc networks., , and . Secur. Commun. Networks, 2 (6): 580-594 (2009)Perfect Hash-Based Routing Lookup for LEO Constellation Backbone Network., , , , and . IEEE Trans. Aerosp. Electron. Syst., 59 (5): 4844-4857 (October 2023)The quantity optimization of special containers and trucks with time windows., , , and . SOLI, page 561-564. IEEE, (2009)Integrity and its applications., , , , and . ACM Southeast Regional Conference, page 350-354. ACM, (2007)One novel variable step-size MPPT algorithm for photovoltaic power generation., , , , and . IECON, page 5750-5755. IEEE, (2012)Cross-Validation., , and . Encyclopedia of Database Systems, Springer US, (2009)Camouflaging mobility for itinerary privacy in mobile ad-hoc networks., , and . WOWMOM, page 1-7. IEEE Computer Society, (2008)