1. Ahrendt T. Fast computations of the exponential function. In: Proceedings of the annual symposium on theoretical aspects of computer science trier, vol. 1563, no. 16, 1999. p. 302–12
2. Akyildiz IF, Vuran MC, Akan OB. On exploiting spatial and temporal correlation in wireless sensor networks. In: Proceedings of the WiOpt 2004: modeling and optimization in mobile, ad hoc and wireless networks, 2004. p. 71–80.
3. Arthur D, Vassilvitskii S. How slow is the k-means method? In: Proceedings of the annual symposium on computational geometry, no. 2, 2006. p. 144–53.
4. Atakli IM, Hu H, Chen Y, Ku WS, Su Z. Malicious node detection in wireless sensor networks using weighted trust evaluation. In: Proceedings of the Spring simulation multiconference, 2008. p. 836–43.
5. Trust and antitrust;Baier;Chic J: Ethics,1986