Author of the publication

Path sampling, a robust alternative to gossiping for opportunistic network routing.

, , , and . WiMob, page 1-8. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of Secure M2M Communication in WSNs Using DTLS., , and . ICDCS Workshops, page 78-83. IEEE Computer Society, (2016)A passive testing approach based on invariants: application to the WAP, , , and . Comput. Networks, 48 (2): 235-245 (2005)Special issue on formal active and passive testing of distributed and networked systems., , and . Ann. des Télécommunications, 70 (3-4): 83-84 (2015)A Study of Threat Detection Systems and Techniques in the Cloud., , and . CRiSIS, volume 10694 of Lecture Notes in Computer Science, page 140-155. Springer, (2017)TestNet: Let's Test Together!., , and . TestCom, volume 2644 of Lecture Notes in Computer Science, page 258-264. Springer, (2003)Smart Measurements and Analysis for Software Quality Enhancement., , , and . ICSOFT (Selected Papers), volume 1077 of Communications in Computer and Information Science, page 194-219. Springer, (2018)Standardization of Formal Methods in Conformance Testing of Communication Protocols., , and . Computer Networks and ISDN Systems, 29 (1): 3-14 (1996)A modal based verification for LOTOS., and . FORTE, volume 6 of IFIP Conference Proceedings, page 215-217. Chapman & Hall, (1994)Different Approaches to Protocol and Service Testing.. IWTCS, volume 147 of IFIP Conference Proceedings, page 3-18. Kluwer, (1999)Formal Verification of Coordination Systems' Requirements - A Case Study on the European Train Control System., and . SEKE, page 393-396. Knowledge Systems Institute Graduate School, (2014)