Author of the publication

Trust determination in ad hoc networks.

, , and . PST, volume 380 of ACM International Conference Proceeding Series, page 52. ACM, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deception framework for sensor networks., , and . SecureComm, page 361-369. IEEE, (2007)Pseudo-Tree Data Structure for Content-Based Composition and Synchronization of Multimedia Presentations.. MMM, page 253-268. World Scientific Press, (1996)Multimedia, network protocols and users - bridging the gap., , and . ACM Multimedia (1), page 473-476. ACM, (1999)A Graph-Based Formalism for Modelling Assembly Tasks., and . ICRA, page 1296-1301. IEEE Computer Society, (1995)Constructing Assembly Plans.. ICRA (2), page 515-520. IEEE Computer Society Press, (1993)Content sensitivity based access control framework for Hadoop., , , and . Digit. Commun. Networks, 3 (4): 213-225 (2017)HMM-driven Smart White-space-aware Frame Control Protocol for coexistence of ZigBee and WiFi., , , , and . PerCom Workshops, page 348-351. IEEE Computer Society, (2013)Properties of assembly Petri net., and . IROS (3), page 191-196. IEEE Computer Society, (1995)Modeling of Web Services Flow., , and . CEC, page 391-398. IEEE Computer Society, (2003)Moving Target with Load Balancing in P2P Cloud., , and . IEEE CLOUD, page 359-366. IEEE Computer Society, (2013)