Author of the publication

A study of simple usage-based charging schemes for broadband networks.

, , , and . Telecommun. Syst., 15 (3-4): 323-343 (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adjacent channel interference in 802.11a is harmful: Testbed validation of a simple quantification model., , , and . IEEE Communications Magazine, 49 (3): 160-166 (2011)IoT Resource Access utilizing Blockchains and Trusted Execution Environments., , , , and . GIoTS, page 1-6. IEEE, (2019)Security requirements and solutions for integrated satellite-terrestrial Information-Centric Networks., , , and . ASMS/SPSC, page 106-113. IEEE, (2014)Enhancing mobile data offloading with mobility prediction and prefetching., and . MobiArch@MobiCom, page 17-22. ACM, (2012)I-CAN: Information-centric future mobile and wireless access networks., , , , and . QSHINE, page 139-141. IEEE, (2014)Access point assignment algorithms in WLANs based on throughput objectives., and . WiOpt, page 375-383. IEEE, (2008)Experiences with a metropolitan multiradio wireless mesh network: design, performance, and application., , and . IEEE Communications Magazine, 50 (7): 128-136 (2012)Resource control for hybrid code and time division scheduling.. PIMRC, page 1772-1776. IEEE, (2004)Adapting Data Popularity in Mobility-Based Proactive Caching Decisions for Heterogeneous Wireless Networks., and . EAI Endorsed Trans. Cloud Syst., 2 (7): e3 (2016)OAuth 2.0 authorization using blockchain-based tokens., , , , and . CoRR, (2020)