default search action
Mieso K. Denko
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j32]Jong Hyuk Park, Ching-Hsien Hsu, Naveen K. Chilamkurti, Mieso K. Denko:
Advances in security and multimodality for pervasive computing environments - TS Special Issue. Telecommun. Syst. 52(2): 1341-1342 (2013) - 2012
- [j31]Jong Hyuk Park, Han-Chieh Chao, Taeshik Shon, Mieso K. Denko:
Guest editorial: Theme issue on smartphone applications and services for pervasive computing. Pers. Ubiquitous Comput. 16(6): 611-612 (2012) - 2011
- [j30]Jong Hyuk Park, Shu-Ching Chen, Mieso K. Denko, Sheikh Iqbal Ahamed:
Preface to Special Section on Intelligent Multimedia Systems and Data Management for UBI-COM. Comput. Informatics 30(3): 413-417 (2011) - [j29]Mieso K. Denko, Tao Sun, Isaac Woungang:
Trust management in ubiquitous computing: A Bayesian approach. Comput. Commun. 34(3): 398-406 (2011) - [j28]Nikhil Saxena, Mieso K. Denko, Dilip K. Banerji:
A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks. Comput. Commun. 34(4): 548-555 (2011) - [j27]Jason B. Ernst, Mieso K. Denko:
The design and evaluation of fair scheduling in wireless mesh networks. J. Comput. Syst. Sci. 77(4): 652-664 (2011) - [j26]Sudip Misra, Mieso K. Denko, Hussein T. Mouftah:
Security challenges in emerging and next-generation wireless communication networks. Secur. Commun. Networks 4(9): 979-980 (2011) - [j25]Binod Vaidya, Mieso K. Denko, Joel J. P. C. Rodrigues:
Security mechanism for voice over multipath mobile ad hoc networks. Wirel. Commun. Mob. Comput. 11(2): 196-210 (2011) - [j24]Young-Sik Jeong, Han-Chieh Chao, Mieso K. Denko, Charalampos Z. Patrikakis:
Editorial: Special Issue on "Trustworthy and Intelligent Services for Ubiquitous Computing". Wirel. Pers. Commun. 56(1): 1-4 (2011) - 2010
- [j23]Thabo K. R. Nkwe, Mieso K. Denko, Jason B. Ernst:
Data ubiquity in autonomic wireless mesh networks. J. Ambient Intell. Humaniz. Comput. 1(1): 3-13 (2010) - [j22]Isaac Woungang, Guangyan Ma, Mieso K. Denko, Sudip Misra, Han-Chieh Chao, Mohammad S. Obaidat:
Survivable ATM mesh networks: Techniques and performance evaluation. J. Syst. Softw. 83(3): 457-466 (2010) - [j21]Jong Hyuk Park, Shu-Ching Chen, Mieso K. Denko, Sheikh Iqbal Ahamed:
ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Advanced Mobile Applications and Intelligent Multimedia systems for Ubi-Com". Mob. Networks Appl. 15(4): 475-476 (2010) - [j20]Waltenegus Dargie, Mieso K. Denko:
Analysis of Error-Agnostic Time- and Frequency-Domain Features Extracted From Measurements of 3-D Accelerometer Sensors. IEEE Syst. J. 4(1): 26-33 (2010) - [j19]Waltenegus Dargie, Xiaojuan Chao, Mieso K. Denko:
Modelling the energy cost of a fully operational wireless sensor network. Telecommun. Syst. 44(1-2): 3-15 (2010) - [c37]Mieso K. Denko, Thabo K. R. Nkwe, Mohammad S. Obaidat:
Efficient Cooperative Caching with Improved Performance in Wireless Mesh Networks. ICC 2010: 1-5 - [c36]Jason B. Ernst, Mieso K. Denko:
Cross-Layer Mixed Bias Scheduling for Wireless Mesh Networks. ICC 2010: 1-5 - [c35]Vasco N. G. J. Soares, Joel J. P. C. Rodrigues, Farid Farahmand, Mieso K. Denko:
Exploiting Node Localization for Performance Improvement of Vehicular Delay-Tolerant Networks. ICC 2010: 1-5 - [c34]Mohamed Hamdi, Noureddine Boudriga, Habtamu Abie, Mieso K. Denko:
Secure Wearable and Implantable Body Sensor Networks in Hazardous Environments. DCNET/OPTICS 2010: 85-92
2000 – 2009
- 2009
- [j18]Mieso K. Denko, Isaac Woungang, Han-Chieh Chao, Pedro Cuenca:
Special issue on ubiquitous wireless mesh networks. Int. J. Commun. Syst. 22(10): 1241-1244 (2009) - [j17]Mieso K. Denko, Tao Sun, Isaac Woungang:
Deterministic Trust Management in Pervasive Computing. J. Mobile Multimedia 5(1): 64-80 (2009) - [j16]Mieso K. Denko, Elhadi M. Shakshuki, Haroon Malik:
Enhanced cross-layer based middleware for mobile ad hoc networks. J. Netw. Comput. Appl. 32(2): 490-499 (2009) - [j15]Byoung-Soo Koh, Mieso K. Denko, Stefanos Gritzalis, Ching-Hsien Hsu:
Data Security and Privacy Protection in Pervasive Computing Environments. J. Univers. Comput. Sci. 15(5): 967-969 (2009) - [j14]Arjan Durresi, Mieso K. Denko:
Advances in wireless networks. Mob. Inf. Syst. 5(1): 1-3 (2009) - [j13]Arjan Durresi, Mieso K. Denko:
Advances in mobile communications and computing. Mob. Inf. Syst. 5(2): 101-103 (2009) - [j12]Mieso K. Denko, Jun Tian, Thabo K. R. Nkwe, Mohammad S. Obaidat:
Cluster-Based Cross-Layer Design for Cooperative Caching in Mobile Ad Hoc Networks. IEEE Syst. J. 3(4): 499-508 (2009) - [c33]Jason B. Ernst, Mieso K. Denko:
Fair Scheduling with Multiple Gateways in Wireless Mesh Networks. AINA 2009: 106-112 - [c32]Zerihun Zewdu, Mieso K. Denko, Mulugeta Libsie:
Workload Characterization of Autonomic DBMSs Using Statistical and Data Mining Techniques. AINA Workshops 2009: 244-249 - [c31]Isaac Woungang, Guangyan Ma, Mieso K. Denko, Alireza Sadeghian, Sudip Misra, Alexander Ferworn:
Survivability in Existing ATM-Based Mesh Networks. AINA 2009: 719-724 - [c30]Cristina Ribeiro, Alexander Ferworn, Mieso K. Denko, James Tran:
Canine Pose Estimation: A Computing for Public Safety Solution. CRV 2009: 37-44 - [c29]Mieso K. Denko, Tao Sun, Isaac Woungang, Joel J. P. C. Rodrigues, Han-Chieh Chao:
A Trust Management Scheme for Enhancing Security in Pervasive Wireless Networks. GLOBECOM 2009: 1-6 - [c28]Mieso K. Denko, Jun Tian, Thabo K. R. Nkwe, Mohammad S. Obaidat:
Cross-Layer Based Data Management in Mobile Ad Hoc Networks. GLOBECOM 2009: 1-6 - [c27]Binod Vaidya, Mieso K. Denko, Joel J. P. C. Rodrigues:
Secure Framework for Voice Transmission over Multipath Wireless Ad-Hoc Network. GLOBECOM 2009: 1-6 - [c26]Mieso K. Denko, Mohammad S. Obaidat:
Fairness and throughput optimization in wireless mesh networks. ICECS 2009: 824-827 - [c25]Mieso K. Denko, Isaac Woungang, Mohammad S. Obaidat:
Trust management in opportunistic pervasive healthcare systems. ICECS 2009: 832-835 - [c24]Thabo K. R. Nkwe, Mieso K. Denko:
Self-optimizing cooperative caching in autonomic Wireless Mesh Networks. ISCC 2009: 411-416 - [c23]Jong Hyuk Park, Robert C. Hsu, Sherali Zeadally, Han-Chieh Chao, Mieso K. Denko, Sheikh Iqbal Ahamed:
Message from the Workshop Co-Organizers. PerCom Workshops 2009: 1-2 - [c22]Bruno M. C. Silva, Paulo A. C. S. Neves, Mieso K. Denko, Joel J. P. C. Rodrigues:
MP-Collaborator: A Mobile Collaboration Tool in Pervasive Environment. WiMob 2009: 344-349 - [e3]Yan Zhang, Laurence Tianruo Yang, Mieso K. Denko:
Autonomic Computing and Networking. Springer 2009, ISBN 978-0-387-89827-8 [contents] - 2008
- [j11]Mieso K. Denko, Chen Wei:
A multi-gateway-based architecture for integrating ad hoc networks with the internet using multiple Foreign Agents. Int. J. Ad Hoc Ubiquitous Comput. 3(2): 99-110 (2008) - [j10]Mieso K. Denko, Isaac Woungang, Han-Chieh Chao, Pedro Cuenca:
Call for Papers: 'Ubiquitous Wireless Mesh Networks'. Int. J. Commun. Syst. 21(11): 1237-1238 (2008) - [j9]Fikreyohannes Lemma, Mieso K. Denko, Joseph K. Tan, Samuel Kinde Kassegne:
Envisioning a National e-Medicine Network Architecture in a Developing Country: A Case Study. Int. J. Heal. Inf. Syst. Informatics 3(1): 44-62 (2008) - [j8]Mieso K. Denko, Elhadi M. Shakshuki, Akio Koyama:
Editorial. J. Mobile Multimedia 4(1): 1 (2008) - [j7]Elhadi M. Shakshuki, Haroon Malik, Mieso K. Denko:
Software agent-based directed diffusion in wireless sensor network. Telecommun. Syst. 38(3-4): 161-174 (2008) - [c21]Tao Sun, Mieso K. Denko:
Performance Evaluation of Trust Management in Pervasive Computing. AINA 2008: 386-394 - [c20]Mieso K. Denko:
Using Mobile Internet Gateways in Wireless Mesh Networks. AINA 2008: 1086-1092 - [c19]Mieso K. Denko, Jum Tian:
Cross-Layer Design for Cooperative Caching in Mobile Ad Hoc Networks. CCNC 2008: 375-380 - [c18]Mieso K. Denko, Tao Sun:
Probabilistic Trust Management in Pervasive Computing. EUC (2) 2008: 610-615 - [c17]Cristina Ribeiro, Alexander Ferworn, Mieso K. Denko, James Tran, Chris Mawson:
Wireless estimation of canine pose for search and rescue. SoSE 2008: 1-6 - [c16]James Tran, Alexander Ferworn, Cristina Ribeiro, Mieso K. Denko:
Enhancing canine disaster search. SoSE 2008: 1-5 - [c15]Peter Mueller, Mieso K. Denko:
Message from the Workshops Co-chairs. WiMob 2008 - [c14]Nidal Nasser, Waltenegus Dargie, Mieso K. Denko, Ahmed H. Zahran:
Message from the HWN-RMQ Workshop Organizing Technical Co-chairs. WiMob 2008 - 2007
- [j6]Mieso K. Denko:
Mobility management in hybrid ad-hoc networks and the Internet environment. Concurr. Comput. Pract. Exp. 19(8): 1193-1206 (2007) - [j5]Mieso K. Denko:
Cooperative Data Caching and Prefetching in Wireless Ad Hoc Networks. Int. J. Bus. Data Commun. Netw. 3(1): 1-15 (2007) - [j4]Liang Ma, Mieso K. Denko:
Enhanced Routing Metric for Load-Balancing in Wireless Mesh Networks. J. Interconnect. Networks 8(4): 407-426 (2007) - [c13]Liang Ma, Mieso K. Denko:
A Routing Metric for Load-Balancing in Wireless Mesh Networks. AINA Workshops (2) 2007: 409-414 - [c12]Mieso K. Denko, Elhadi M. Shakshuki, Haroon Malik:
A Mobility-Aware and Cross-layer Based Middleware for Mobile Ad Hoc Networks. AINA 2007: 474-481 - [c11]Haroon Malik, Elhadi M. Shakshuki, Travis DeWolf, Mieso K. Denko:
Multi-Agent System for Directed Diffusion in Wireless Sensor Networks. AINA Workshops (2) 2007: 635-640 - [c10]Jun Tian, Mieso K. Denko:
Exploiting Clustering and Cross-Layer Design Approaches for Data Caching in MANETs. WiMob 2007: 52 - [e2]Mieso K. Denko, Chi-Sheng Shih, Kuan-Ching Li, Shiao-Li Tsao, Qing-An Zeng, Soo-Hyun Park, Young-Bae Ko, Shih-Hao Hung, Jong Hyuk Park:
Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings. Lecture Notes in Computer Science 4809, Springer 2007, ISBN 978-3-540-77089-3 [contents] - [e1]Parimala Thulasiraman, Xubin He, Tony Li Xu, Mieso K. Denko, Ruppa K. Thulasiram, Laurence Tianruo Yang:
Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, ISPA 2007 International Workshops SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN Niagara Falls, Canada, August 28 - September 1, 2007, Proceedings. Lecture Notes in Computer Science 4743, Springer 2007, ISBN 978-3-540-74766-6 [contents] - 2006
- [j3]Mieso K. Denko, Hua Lu:
Replica dissemination and update strategies in cluster-based mobile ad hoc networks. Mob. Inf. Syst. 2(4): 193-209 (2006) - [c9]Mieso K. Denko:
A Mobility Management Scheme for Hybrid Wired and Wireless Networks. AINA (2) 2006: 366-372 - [c8]Mieso K. Denko:
PUSMAN: Publish-Subscribe Middleware for Ad Hoc Networks. CCECE 2006: 1677-1681 - [c7]Mieso K. Denko, Jun Tian:
Cooperative Caching with Adaptive Prefetching in Mobile Ad Hoc Networks. WiMob 2006: 38-44 - 2005
- [c6]Mieso K. Denko:
A Localized Architecture for Detecting Denial of Service (DoS) Attacks in Wireless AD Hoc Networks. INTELLCOMM 2005: 135-146 - [c5]Mieso K. Denko:
A reputation-based service differentiation scheme for mobile ad hoc networks. WiMob (3) 2005: 197-204 - 2004
- [j2]Mieso K. Denko:
A mobile agent-based clustering architecture for mobile ad hoc networks. South Afr. Comput. J. 32: 79-86 (2004) - [c4]Mieso K. Denko:
A Markov Model-Based Location Prediction Scheme for Mobile Ad-Hoc Networks. International Conference on Wireless Networks 2004: 179-184 - [c3]Ikram Jaffery, Mieso K. Denko:
A Mobile Agent-Based Location Management Scheme for Mobile Ad-Hoc Networks. International Conference on Wireless Networks 2004: 703-706 - 2003
- [c2]Mieso K. Denko, Qusay H. Mahmoud:
Mobile Agents for Clustering and Routing in Mobile Ad Hoc Networks. ADHOC-NOW 2003: 271-276 - [c1]Mieso K. Denko:
Analysis of Clustering Algorithms in Mobile Ad Hoc Networks. International Conference on Wireless Networks 2003: 98-108 - 2002
- [j1]Mieso K. Denko, Wayne Goddard:
Limited flooding protocol for mobile ad hoc networks. South Afr. Comput. J. 29: 49-57 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint