Author of the publication

Experiences from a field test using ICN for live video streaming.

, , , , , , and . ICME Workshops, page 1-6. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Random Re-Routing for Differentiated QoS in Sensor Networks., and . BCS Int. Acad. Conf., page 343-354. British Computer Society, (2008)An Adaptive Delay-Minimized Route Design for Wireless Sensor-Actuator Networks., , and . IEEE Trans. Vehicular Technology, 58 (9): 5083-5094 (2009)Guest Editorial Special Issue on Cloud Computing for IoT., , , and . IEEE Internet of Things Journal, 3 (3): 254-256 (2016)Vulnerable Friend Identification: Who Should You Beware of Most in Online Social Networks?, , , , , and . GLOBECOM, page 1-6. IEEE, (2015)Employing attribute-based encryption in systems with resource constrained devices in an information-centric networking context., , , and . GIoTS, page 1-6. IEEE, (2017)Privacy-aware probabilistic sampling for data collection in wireless sensor networks., , and . IWCMC, page 314-319. IEEE, (2011)Energy-Latency Tradeoff for Energy-Aware Offloading in Mobile Edge Computing Networks., , , , , , , and . IEEE Internet of Things Journal, 5 (4): 2633-2645 (2018)An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks., , and . Comput. Commun., 30 (11-12): 2353-2364 (2007)Energy-efficient automatic location-triggered applications on smartphones., and . Comput. Commun., (2014)Wireless sensor deployment for collaborative sensing with mobile phones., , and . Comput. Networks, 55 (15): 3224-3245 (2011)