Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks., , , , , and . IEEE Trans. Mob. Comput., 6 (6): 663-677 (2007)Augur: Modeling the Resource Requirements of ConvNets on Mobile Devices., , , , and . IEEE Trans. Mob. Comput., 20 (2): 352-365 (2021)Distributed utility-based rate adaptation protocols for prioritized, quasi-elastic flows., , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 13 (1): 2-13 (2009)Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud., , , , , and . IEEE/ACM Trans. Netw., 27 (2): 560-576 (2019)TeamPhone: Networking Smartphones for Disaster Recovery., , and . CoRR, (2016)Sensor Mission Assignment in Rechargeable Wireless Sensor Networks., , , and . ACM Trans. Sens. Networks, 10 (4): 60:1-60:39 (2014)On Progressive Network Recovery From Massive Failures Under Uncertainty., , , and . IEEE Trans. Netw. Serv. Manag., 16 (1): 113-126 (2019)Splitter: Mining Fine-Grained Sequential Patterns in Semantic Trajectories., , , , and . Proc. VLDB Endow., 7 (9): 769-780 (2014)On-demand Information Retrieval from Videos Using Deep Learning in Wireless Networks: Demo Abstract., , , and . IoTDI, page 279-280. ACM, (2017)VidQ: Video Query Using Optimized Audio-Visual Processing., , and . Q2SWinet, page 51-60. ACM, (2021)