Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wireless sensor networks in knowledge management., , , , , , and . ICCS, volume 1 of Procedia Computer Science, page 2291-2300. Elsevier, (2010)Network Convergence over MPLS., , and . HSNMC, volume 3079 of Lecture Notes in Computer Science, page 290-300. Springer, (2004)An approach for applying multi-agent technology into wireless sensor networks., , , , , and . EATIS, page 22. (2007)Exhaustif: a fault injection tool for distributed heterogeneous embedded systems., , , , and . EATIS, page 17. (2007)A Software Package for Web Deployment of Probabilistic Graphical Models., , , , , , and . SCAI, volume 257 of Frontiers in Artificial Intelligence and Applications, page 175-184. IOS Press, (2013)ATM transport between UMTS base stations and controllers: supporting topology and dimensioning decisions., , , , and . PIMRC, page 2176-2180. IEEE, (2004)Multimedia Services for Distant Work and Education in an IP/ATM Environment., , , , , and . IEEE Multim., 8 (3): 68-77 (2001)Efficiency and quality of service issues in MPLS transport for the UMTS access network., , , and . Comput. Commun., 29 (7): 820-826 (2006)QoS in wireless sensor networks: survey and approach., , , , , and . EATIS, page 20. (2007)ASA: advanced secure architecture for preventing unauthorized access in personal computer platforms and BIOS., , , , , and . EATIS, page 18. (2007)