Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Packet Combining for IPv6 soft handover applied to Network Mobility., , and . PIMRC, page 1-5. IEEE, (2008)Optimal Constant-Window Backoff Scheme for IEEE 802.11 DCF in Single-Hop Wireless Networks Under Finite Load Conditions., and . Wireless Personal Communications, 43 (4): 1583-1602 (2007)Considerations of IP multicast for load balancing in Proxy Mobile IPv6 networks., and . Comput. Networks, (2014)Scalability demonstration of a large scale GPU-based network simulator., , , and . SimuTools, page 139-141. ICST/ACM, (2013)MA/FEC: A QoS-Based Adaptive FEC for Multicast Communication in Wireless Networks., , and . ICC (2), page 954-958. IEEE, (2000)Joint Scheduling and Buffer Management Policies for DTN Applications of Different Traffic Classes., , and . IEEE Trans. Mob. Comput., 17 (12): 2818-2834 (2018)Analyzing X2 handover in LTE/LTE-A., , , and . WiOpt, page 74-80. IEEE, (2016)The STAC (security toolbox: attacks & countermeasures) ontology., , and . WWW (Companion Volume), page 165-166. International World Wide Web Conferences Steering Committee / ACM, (2013)Scalable proxy mobile IPv6 for heterogeneous wireless networks., and . Mobility Conference, page 64. ACM, (2008)High Level Interpretaton of Execution Traces of Ada Tasks., , and . ESEC, volume 289 of Lecture Notes in Computer Science, page 309-317. Springer, (1987)