Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Context-Aware Communication Link for Unmanned Aerial Vehicles., , , and . AICT, page 497-502. IEEE Computer Society, (2010)The Evaluation Process of a Computer Security Incident Ontology., and . WONTO, volume 199 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)Managing wireless IP-connectivity experiences as mobile social media., , and . ICUMT, page 154-161. IEEE, (2010)A Beaconing-Based Opportunistic Service Discovery Protocol for Vehicular Networks., , , and . AINA Workshops, page 498-503. IEEE Computer Society, (2014)Exploring user's habits and virtual communities to improve IP-connectivity management., , , , , and . ICUMT, page 1-6. IEEE, (2009)Exploiting Location and Contextual Information to Develop a Comprehensive Framework for Proactive Handover in Heterogeneous Environments., , , , , , , and . J. Comput. Networks Commun., (2012)Attraction-Area Based Geo-Clustering for LTE Vehicular CrowdSensing Data Offloading., , , , and . MSWiM, page 323-327. ACM, (2017)Social and location-based collaboration mechanism to manage wireless connectivity context data., , , and . WCNC, page 2288-2293. IEEE, (2012)Implementation of an Intrusion Detection System Based on Mobile Agents., and . PDSE, page 158-164. IEEE Computer Society, (2000)Electronic commerce and its socio-economic implications in Brazilian small and medium enterprises., , and . ISTAS, page 45-50. IEEE, (2002)