Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomalies in Parallel Branch-and-Bound Algorithms., and . ICPP, page 183-190. IEEE Computer Society, (1983)Bandwidth Management Providing Guaranteed Call Dropping Rates for Multimedia Mobile Networks., and . IEEE International Conference on Multimedia and Expo (II), page 963-966. IEEE Computer Society, (2000)SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution., , , , , and . CoRR, (2018)Private and Secure Tag Access for Large-Scale RFID Systems., , , , and . IEEE Trans. Dependable Secur. Comput., 13 (6): 657-671 (2016)Optimal sleep-wakeup algorithms for barriers of wireless sensors., , , and . BROADNETS, page 327-336. IEEE, (2007)GPS-based message broadcast for adaptive inter-vehicle communications, , , , , and . Vehicular Technology Conference, 2000. IEEE VTS-Fall VTC 2000. 52nd, 6, page 2685-2692 vol.6. (2000)Location aided broadcast in wireless ad hoc network systems., and . WCNC, page 597-602. IEEE, (2002)COS-based inter-switch handoffs in wireless ATM: pitfalls and solutions., and . WCNC, page 51-55. IEEE, (1999)Mobile real-time communications in FDDI networks., , and . ICNP, page 201-208. IEEE Computer Society, (1995)Energy-efficient intrusion detection with a barrier of probabilistic sensors., , and . INFOCOM, page 118-126. IEEE, (2012)