Author of the publication

Efficient Greedy Forwarding Scheme Using Back-Off Intervals in Wireless Sensor Networks.

, , , and . ICCSA Workshops, page 222-227. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Near wireless-control technology between smart devices using inaudible high-frequencies., and . Multimedia Tools Appl., 74 (15): 5955-5971 (2015)On Balancing Delay and Cost for Routing Paths., , and . International Conference on Computational Science, volume 3036 of Lecture Notes in Computer Science, page 602-606. Springer, (2004)Energy Efficient Expanding Ring Search for Route Discovery in MANETs., and . ICC, page 3002-3006. IEEE, (2008)On Generating Backbone Trees through Robust Multi-hop Clusters in Wireless Sensor Networks., , and . APCHI, volume 5068 of Lecture Notes in Computer Science, page 30-39. Springer, (2008)On Core Selection Algorithm for Reducing Delay Variation of Many-to-Many Multicasts with Delay-Bounds., , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 200-210. Springer, (2004)Inaudible Transmission System with Selective Dual Frequencies Robust to Noisy Surroundings., , , , , and . ICCE, page 1-6. IEEE, (2020)An Efficient Method for Proportional Differentiated Admission Control Implementation., and . EURASIP J. Wireless Comm. and Networking, (2011)Agent-based simulation system AGNES* for networks modeling: review and researching., , and . ICUIMC, page 115:1-115:4. ACM, (2012)No similarity attraction effect of ads on the ambivert, but interaction effect between ads and product personalities., , , , , and . ICUIMC, page 115:1-115:6. ACM, (2014)Flooding attack in energy harvesting wireless sensor networks., , and . ICUIMC, page 49. ACM, (2013)