Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capacity estimation and waveform assignment in military networks., , , , and . MILCOM, page 1-6. IEEE, (2012)Tuning of reinforcement learning parameters applied to OLSR using a cognitive network design tool., , , , and . WCNC, page 2786-2791. IEEE, (2012)Planning & design of routing architectures for multi-tier military networks., , , , , and . MILCOM, page 1-7. IEEE, (2012)AMRoute: Ad Hoc Multicast Routing Protocol., , , and . Mob. Networks Appl., 7 (6): 429-439 (2002)MarconiNet supporting streaming media over localized wireless multicast., , , , , and . Workshop Mobile Commerce, page 61-69. ACM, (2002)A New Trapdoor Knapsack Public-Key Cryptosystem., and . EUROCRYPT, volume 209 of Lecture Notes in Computer Science, page 150-158. Springer, (1984)Reliable Broadband Communication Using a Burst Erasure Correcting Code.. SIGCOMM, page 297-306. ACM, (1990)Quantifying TCP Performance Improvements in Noisy Environments Using Protocol Boosters., , and . ISCC, page 92-97. IEEE Computer Society, (2000)IDMP-based fast handoffs and paging in IP-based 4G mobile networks., , , , and . IEEE Commun. Mag., 40 (3): 138-145 (2002)Implementation and performance evaluation of TeleMIP., , , , , and . ICC, page 2488-2493. IEEE, (2001)