Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Constant-Window Backoff Scheme for IEEE 802.11 DCF in Single-Hop Wireless Networks Under Finite Load Conditions., and . Wireless Personal Communications, 43 (4): 1583-1602 (2007)Joint Scheduling and Buffer Management Policies for DTN Applications of Different Traffic Classes., , and . IEEE Trans. Mob. Comput., 17 (12): 2818-2834 (2018)Analyzing X2 handover in LTE/LTE-A., , , and . WiOpt, page 74-80. IEEE, (2016)The STAC (security toolbox: attacks & countermeasures) ontology., , and . WWW (Companion Volume), page 165-166. International World Wide Web Conferences Steering Committee / ACM, (2013)Scalable proxy mobile IPv6 for heterogeneous wireless networks., and . Mobility Conference, page 64. ACM, (2008)High Level Interpretaton of Execution Traces of Ada Tasks., , and . ESEC, volume 289 of Lecture Notes in Computer Science, page 309-317. Springer, (1987)MA/FEC: A QoS-Based Adaptive FEC for Multicast Communication in Wireless Networks., , and . ICC (2), page 954-958. IEEE, (2000)Scalability demonstration of a large scale GPU-based network simulator., , , and . SimuTools, page 139-141. ICST/ACM, (2013)Approach for Semantic Interoperability Testing in Internet of Things., , , , and . GIoTS, page 1-6. IEEE, (2018)Applying Internet of Things for personalized healthcare in smart homes, , , , and . 2015 24th Wireless and Optical Communication Conference (WOCC), page 164--169. IEEE, (2015)