Author of the publication

PDP and GSDL: A New Service Discovery Middleware to Support Spontaneous Interactions in Pervasive Systems.

, , , , and . PerCom Workshops, page 178-182. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation of CoAP and MQTT with security support for IoT environments., , , and . Comput. Networks, (2021)Adapting a Bandwidth-Efficient Information Dissemination Scheme for Urban VANETs., , , and . UCAmI, volume 9454 of Lecture Notes in Computer Science, page 72-83. Springer, (2015)Design of a FIPA-Compliant Agent Platform for Limited Devices., , and . MATA, volume 2881 of Lecture Notes in Computer Science, page 180-189. Springer, (2003)Performance Evaluation of LZ-Based Location Prediction Algorithms in Cellular Networks., , and . IEEE Communications Letters, 14 (8): 707-709 (2010)An Efficient, Eco-Friendly Approach for Push-Advertising of Services in VANETs., , , , , and . UCAmI, volume 7656 of Lecture Notes in Computer Science, page 50-57. Springer, (2012)PDP: A lightweight discovery protocol for local-scope interactions in wireless ad hoc networks., , , and . Comput. Networks, 50 (17): 3264-3283 (2006)Decoupling path failure detection from congestion control to improve SCTP failovers., , , , , and . IEEE Communications Letters, 12 (11): 858-860 (2008)Secure Service Discovery based on Trust Management for ad-hoc Networks., , , , and . J. Univers. Comput. Sci., 12 (3): 340 (2006)Smart Camera Phones: Limits and Applications., and . IEEE Pervasive Comput., 4 (2): 84-87 (2005)Detecting Malicious Use of DoH Tunnels Using Statistical Traffic Analysis., , and . PE-WASUN, page 25-32. ACM, (2022)