Author of the publication

Multicasting multimedia streams in IEEE 802.11 networks: a focus on reliability and rate adaptation.

, , , and . Wireless Networks, 17 (1): 119-131 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biometric Authentication for Border Control Applications., and . IEEE Trans. Knowl. Data Eng., 20 (8): 1091-1096 (2008)Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate., and . HCI (5), volume 4554 of Lecture Notes in Computer Science, page 428-437. Springer, (2007)A Model for Embedding and Authorizing Digital Signatures in Printed Documents., , , and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 465-477. Springer, (2002)New Architecture for Multiplication in GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography., , and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 335-351. Springer, (2005)An approximate analysis of handoff traffic in mobile cellular networks., , , and . WCNC, page 480-483. IEEE, (2000)Adaptive local route optimization in hierarchical mobile IPv6 networks., , and . WCNC, page 1421-1426. IEEE, (2005)An adaptive mobility anchor point selection scheme in Hierarchical Mobile IPv6 networks., , , and . Comput. Commun., 29 (16): 3066-3078 (2006)A pointer forwarding scheme with mobility-aware binding update in Mobile IPv6 networks., , , and . Comput. Commun., 31 (5): 873-884 (2008)TA-MAC: Task Aware MAC Protocol for Wireless Sensor Networks., , , and . VTC Spring, page 294-298. IEEE, (2006)Secure Authentication Scheme with Improved Anonymity for Wireless Environments., and . IEICE Trans. Commun., 94-B (2): 554-557 (2011)