Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Queueing network analysis: concepts, terminology, and methods., , , and . J. Syst. Softw., 66 (2): 99-117 (2003)Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics., , , , and . IEEE Commun. Surv. Tutorials, 14 (2): 579-606 (2012)Energy-efficient search for finite-lifetime resources in sensor networks with time-constrained queries., , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 12 (2): 31-39 (2008)Real-time queueing theory: A tutorial presentation with an admission control application., , , and . Queueing Syst. Theory Appl., 35 (1-4): 1-21 (2000)A survey of state-of-the-art in anonymity metrics., , , , and . NDA, page 31-40. ACM, (2008)Performance evaluation and analysis of effective range and data throughput for unmodified bluetooth communication devices., , , and . ICON, page 665-671. IEEE, (2003)Improving ZigBee Device Network Authentication Using Ensemble Decision Tree Classifiers With Radio Frequency Distinct Native Attribute Fingerprinting., , and . IEEE Trans. Reliability, 64 (1): 221-233 (2015)A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission., , and . PerCom, page 1-7. IEEE Computer Society, (2009)Bluetooth Discovery Time with Multiple Inquirers., , and . HICSS, IEEE Computer Society, (2006)Graduate Digital Forensics Education at the Air Force Institute of Technology., , and . HICSS, page 264. IEEE Computer Society, (2007)