Author of the publication

Architecting 5G RAN slicing for location aware vehicle to infrastructure communications: The Autonomous Tram use case.

, , , , , and . Comput. Networks, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Teletraffic analysis of hierarchical cellular communication networks., , and . IEEE Trans. Vehicular Technology, 52 (4): 931-946 (2003)Tracing a Linearly Moving Node From Asynchronous Time-of-Arrival Measurements., , and . IEEE Communications Letters, 20 (9): 1836-1839 (2016)Performance assessment and tuning rules for low-power and lossy stacks., , , , and . WFCS, page 71-74. IEEE, (2012)A tenant-driven slicing enforcement scheme based on Pervasive Intelligence in the Radio Access Network., , , , and . Comput. Networks, (2022)Decentralized Traffic Aware Scheduling in 6TiSCH Networks: Design and Experimental Evaluation., , , , , and . IEEE Internet Things J., 2 (6): 455-470 (2015)Gazing into the Crystal Ball: When the Future Internet Meets the Mobile Clouds., , , , , , and . IEEE Trans. Cloud Computing, 7 (1): 210-223 (2019)A dynamic bandwidth allocation algorithm for supporting real-time applications in 802.15.3 wpans., , , and . Q2SWinet, page 8-15. ACM, (2007)DeSRTO: An Effective Algorithm for SRTO Detection in TCP Connections., , and . TMA, volume 6003 of Lecture Notes in Computer Science, page 87-100. Springer, (2010)Content Centric Services in Smart Cities., , , , and . NGMAST, page 187-192. IEEE, (2012)EXCHANge: Securing IoT via channel anonymity., , , , and . Comput. Commun., (2019)