Author of the publication

A Social-Based Approach for Message Dissemination in Vehicular Ad Hoc Networks.

, , and . ADHOCNETS, volume 140 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 27-38. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamically blocking contagions in complex networks by cutting vital connections., , and . ICC, page 1170-1175. IEEE, (2015)Hunting for supernovae articles in the universe of scientometrics.. CoRR, (2019)Content-Based Music Information Retrieval in Wireless Ad-Hoc Networks., , , , and . ISMIR, page 137-144. (2005)Age Decaying H-Index for Social Network of Citations., , and . SAW, volume 245 of CEUR Workshop Proceedings, CEUR-WS.org, (2007)Bibliometric indices for the assessment of the citation curve tail., , , and . Panhellenic Conference on Informatics, page 305-310. ACM, (2015)Social Network Analysis and Its Applications in Wireless Sensor and Vehicular Networks., , and . e-Democracy, volume 26 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 411-420. Springer, (2009)Feature models for big data applications: Modeling big data applications by applying feature models., , , , and . IISA, page 1-6. IEEE, (2017)Topology control algorithms for wireless sensor networks: a critical survey., , and . CompSysTech, page 1-10. ACM, (2010)Efficiently Maintaining Structural Associations of Semistructured Data.. Panhellenic Conference on Informatics, volume 2563 of Lecture Notes in Computer Science, page 118-132. Springer, (2001)A Suffix Tree Based Prediction Scheme for Pervasive Computing Environments., and . Panhellenic Conference on Informatics, volume 3746 of Lecture Notes in Computer Science, page 267-277. Springer, (2005)