Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Tussle Analysis for Information-Centric Networking Architectures., , , , , and . Future Internet Assembly, volume 7281 of Lecture Notes in Computer Science, page 6-17. Springer, (2012)An Open Framework for the Assessment of 5G Business Cases and Investments., , , , and . IEEE Commun. Mag., 61 (2): 44-50 (February 2023)Understanding incentives for prefix aggregation in BGP., , and . ReArch@CoNEXT, page 49-54. ACM, (2009)WOICE: A Decentralized System for Ubiquitous VoIP Services., , and . DigiBiz, volume 21 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 74-81. Springer, (2009)5G ecosystem dilemmas: sharing roles and revenues., , and . EuCNC, page 144-148. IEEE, (2020)Optimal call routing in VoIP., , and . ITC, page 1-8. IEEE, (2009)Οικονομικά θέματα και τεχνολογίες παροχής υπηρεσιών φωνής με χρήση πρωτοκόλλων διαδικτύου. Athens University Economics and Business, Greece, (2009)National Archive of PhD Theses: oai:10442/17652.Operational Trustworthiness Enabling Technologies - The OPTET Project., , , , and . ERCIM News, (2015)Profit-Maximizing Trustworthiness Level of Composite Systems., , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 357-368. Springer, (2015)Usable Trust: Grasping Trust Dynamics for Online Security as a Service., , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 271-283. Springer, (2015)