Author of the publication

3-D Localization Schemes of RFID Tags with Static and Mobile Readers.

, and . Networking, volume 4982 of Lecture Notes in Computer Science, page 112-123. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Orchestration of Virtual Network Functions., , , and . CoRR, (2017)Bringing SDN to the edge of tactical networks., , , , and . MILCOM, page 1047-1052. IEEE, (2016)INSPIRE Ontology Handler: Automatically building and managing a knowledge base for Critical Information Infrastructure protection., and . Integrated Network Management, page 694-697. IEEE, (2011)Optimal orchestration of virtual network functions., , , and . Comput. Networks, (2018)Statesec: Stateful monitoring for DDoS protection in software defined networks., , , , and . NetSoft, page 1-9. IEEE, (2017)Split and Merge: Detecting Unknown Botnets., , , and . IM, page 153-161. IFIP, (2019)Monitoring latency with OpenFlow., and . CNSM, page 122-125. IEEE Computer Society, (2013)Designing the core components of an operator-driven, framework for unifying autonomic network and service management., , , , , , , , and . Future Network & Mobile Summit, page 1-8. IEEE, (2012)Detection of zero-day attacks: An unsupervised port-based approach., , , and . Comput. Networks, (2020)Let there be Chaining: How to Augment your IGP to Chain your Services., , , and . Networking, page 1-9. IEEE, (2019)