Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing Redundant Content in Bandwidth Constrained Wireless Networks., , , , and . CoNEXT, page 349-362. ACM, (2014)A measurement driven, 802.11 anti-jamming system, , , and . CoRR, (2009)Improving the Performance of TCP in the Presence of Interacting UDP Flows in Ad Hoc Networks., , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 64-75. Springer, (2004)A broadband wireless access network based on mesh-connected free-space optical links., and . IEEE Wirel. Commun., 6 (5): 62-65 (1999)MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking., , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (1): 729-744 (2021)ADC: Adversarial attacks against object Detection that evade Context consistency checks., , , , , and . CoRR, (2021)MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking., , , , , and . CoRR, (2020)Local versus global power adaptive broadcasting in ad hoc networks., , , , and . WCNC, page 2069-2075. IEEE, (2005)Scalable unidirectional routing with zone routing protocol (ZRP) extensions for mobile ad-hoc networks., , and . WCNC, page 1329-1339. IEEE, (2000)On tolerating single link, double link, and nodal failures in symmetric grid networks., , and . WCNC, page 572-581. IEEE, (2000)