Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDoS Attack and Source Detection System for ISP Network., , and . Communications, Internet, and Information Technology, page 118-123. IASTED/ACTA Press, (2002)Welcome message from general co-chairs., , and . LANMAN, page 1-2. IEEE, (2017)A rewarding scheme for collaborative crowdsourcing in cellular Networks., , , , and . ICC, page 1-6. IEEE, (2017)Mobile IP fast data transfer method using cooperation between mobility agents., , , and . GLOBECOM, page 3473-3477. IEEE, (2003)On Verification of Remote Computing on Potentially Untrusted Nodes., , , and . ICNP, page 1-2. IEEE, (2019)Multipath Support for Name-based Information Dissemination in Fragmented Networks., , , , , and . ICN, page 201-202. ACM, (2015)Demo: panoramic streaming using named tiles., , , and . ICN, page 204-205. ACM, (2017)AS alliance: cooperatively improving resilience of intra-alliance communication., , , , and . CoNEXT, page 76. ACM, (2008)Empirically modeling how a multicore software ICN router and an ICN network consume power., , , , , and . ICN, page 157-166. ACM, (2014)Routing-Based Mobility Architecture for Future 5G Cellular Networks., , , , , and . IEICE Trans. Commun., 100-B (10): 1789-1797 (2017)