Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-intrusive transaction monitoring using system logs., , , and . NOMS, page 879-882. IEEE, (2008)Mirage: Mitigating illicit inventorying in a RFID enabled retail environment., and . COMSNETS, page 1-9. IEEE, (2011)Fast determination of QoS-based multicast routes in wireless networks using genetic algorithm., and . ICC, page 2588-2592. IEEE, (2001)A retrospective look at the UMass DOME mobile testbed., , , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 15 (4): 2-15 (2011)Session details: EDUCATION., and . GetMobile, (2018)Deployment Study Length: How Long Should a System Be Evaluated in the Wild?, , , , and . GetMobile, 19 (2): 18-21 (2015)Concurrent Wi-Fi for mobile users: analysis and measurements., , , , , and . CoNEXT, page 4. ACM, (2011)Influencing Participant Behavior Through a Notification-Based Recommendation System., , , , , , , , and . PERSUASIVE, volume 10809 of Lecture Notes in Computer Science, page 113-119. Springer, (2018)Presence based network topology tracing system for VoIP networks., , and . Integrated Network Management, page 785-799. IEEE, (2011)An efficient multi-objective QoS-routing algorithm for wireless multicasting., , and . VTC Spring, page 1160-1164. IEEE, (2002)