Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feasibility of Signaling Storms in 3G/UMTS Operational Networks., , and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 187-198. (2015)Packets travelling in non-homogeneous networks., and . MSWiM, page 361-368. ACM, (2011)A basic hybrid library support model to distance learners in Sudan.. J. Libr. Inf. Sci., 44 (1): 19-26 (2012)Detection and mitigation of signaling storms in mobile networks., , and . ICNC, page 1-5. IEEE Computer Society, (2016)Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach., , , and . ISCIS, volume 264 of Lecture Notes in Electrical Engineering, page 429-438. Springer, (2013)A Low-latency and Self-adapting Application Layer Multicast., , and . ISCIS, volume 62 of Lecture Notes in Electrical Engineering, page 169-172. Springer, (2010)Performance Trade-Offs in a Network Coding Router., and . ICCCN, page 1-6. IEEE, (2010)Countering Mobile Signaling Storms with Counters., and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 199-209. (2015)Search in Random Media with Lévy Flights, and . CoRR, (2013)Packet Delay and Energy Consumption in Non-homogeneous Networks., and . Comput. J., 55 (8): 950-964 (2012)