Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Object Group Localization in the Internet of Things: Performance Analysis., , , and . IEEE Trans. Vehicular Technology, 64 (8): 3645-3656 (2015)Modeling Dynamic Satellite Bandwidth Allocation for Situation-Awareness Applications., , , , and . PSATS, volume 71 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 19-32. Springer, (2011)Analysis of Threshold-Based Call Admission Strategy in a Wireless ATM Network Loaded by Multiple-Class Multiple-Service Traffic., , , and . ESM, page 798-805. SCS Europe, (1998)A MAC/Routing cross-layer approach to geographic forwarding in wireless sensor networks., , , and . Ad Hoc Networks, 5 (6): 872-884 (2007)The Social Internet of Things., , and . IC2E, page 1. IEEE Computer Society, (2015)On the use of Blockchain technologies in WiFi networks., , , and . Comput. Networks, (2019)Georoy: A location-aware enhancement to Viceroy peer-to-peer algorithm., , , , , and . Comput. Networks, 51 (8): 1998-2014 (2007)MGM-4-FL: Combining federated learning and model gossiping in WSNs., , and . Comput. Networks, (2022)Toward the EthicNet: Challenges and Enablers for Ethics-Aware Networks., , , and . IEEE Commun. Mag., 61 (11): 192-198 (November 2023)Exploiting the Timing Channel to Increase Energy Efficiency in Wireless Networks.. IEEE J. Sel. Areas Commun., 29 (8): 1711-1720 (2011)