Author:
Yadav Rakesh Kumar,Mahapatra R.P.
Subject
General Computer Science,Theoretical Computer Science
Reference46 articles.
1. Data preserving techniques for collaborative data publishing;Indhumathi;Int. J. Eng. Res. Technol. (IJERT),2013
2. S. Mohana, S.A. Sahaaya Arul Mary, Heuristics for privacy preserving data mining: An evaluation, in: 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET), Publisher IEEE, pp. 1–9.
3. Fly and recharge: Achieving persistent coverage using small unmanned aerial vehicles (SUAVs);Trotta,2017
4. Nicola Roberto Zema, Angelo Trotta, Guillaume Sanahuja, Enrico Natalizio, Marco Di Felice, Luciano Bononi, CUSCUS: An integrated simulation architecture for distributed networked control systems, pp. 287–292.
5. Luca Bedogni, Luciano Bononi, Roberto Canegallo, Fabio Carbone, Marco Di Felice, Eleonora Franchi Scarselli, Federico Montori, Luca Perilli, Tullio Salmon Cinotti, Angelo Trotta, Dual-mode wake-up nodes for iot monitoring applications: Measurements and algorithms, in: 2018 IEEE International Conference on Communications (ICC), pp. 1–7.
Cited by
46 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献