Author of the publication

Assessing the Expected Performance of the OLSR Routing Protocol for Denser Urban Core Ad Hoc Network Deployments.

, , and . AINA, page 406-414. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Jamming Strategies in DYMO MANETs: Assessing Detectability and Operational Impacts., , and . BWCCA, page 114-121. IEEE, (2012)Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation., , and . IEEE Trans. Inf. Forensics Secur., 7 (4): 1278-1287 (2012)Time Correlation Analysis of Secret Key Generation via UWB Channels., , and . GLOBECOM, page 1-6. IEEE, (2010)Verification of Secret Key Generation from UWB Channel Observations., , , , and . ICC, page 1-5. IEEE, (2009)A model based approach to fault detection for the reverse path of cable television networks., , and . IEEE Trans. Broadcast., 44 (4): 478-487 (1998)Robust adversarial learning and invariant measures., , and . PACRIM, page 529-535. IEEE, (2015)On Assessing the Impact of Jamming Strategies on the Behavior of DYMO-Based MANETs., , and . BWCCA, page 167-174. IEEE Computer Society, (2011)Assessing the Expected Performance of the OLSR Routing Protocol for Denser Urban Core Ad Hoc Network Deployments., , and . AINA, page 406-414. IEEE Computer Society, (2012)A Distributed Application-Level IT System Workload Generator., , and . AINA Workshops, page 1100-1105. IEEE Computer Society, (2009)Efficiently Achieving Full Three-Way Non-repudiation in Consumer-Level eCommerce and M-Commerce Transactions., and . TrustCom, page 664-672. IEEE Computer Society, (2011)