Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capacity estimation and waveform assignment in military networks., , , , and . MILCOM, page 1-6. IEEE, (2012)Tuning of reinforcement learning parameters applied to OLSR using a cognitive network design tool., , , , and . WCNC, page 2786-2791. IEEE, (2012)MarconiNet supporting streaming media over localized wireless multicast., , , , , and . Workshop Mobile Commerce, page 61-69. ACM, (2002)Planning & design of routing architectures for multi-tier military networks., , , , , and . MILCOM, page 1-7. IEEE, (2012)A New Trapdoor Knapsack Public-Key Cryptosystem., and . EUROCRYPT, volume 209 of Lecture Notes in Computer Science, page 150-158. Springer, (1984)AMRoute: Ad Hoc Multicast Routing Protocol., , , and . Mob. Networks Appl., 7 (6): 429-439 (2002)Reliable Broadband Communication Using a Burst Erasure Correcting Code.. SIGCOMM, page 297-306. ACM, (1990)Quantifying TCP Performance Improvements in Noisy Environments Using Protocol Boosters., , and . ISCC, page 92-97. IEEE Computer Society, (2000)IDMP-based fast handoffs and paging in IP-based 4G mobile networks., , , , and . IEEE Commun. Mag., 40 (3): 138-145 (2002)Implementation and performance evaluation of TeleMIP., , , , , and . ICC, page 2488-2493. IEEE, (2001)