Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using identities to achieve enhanced privacy in future content delivery networks., and . Comput. Electr. Eng., 38 (2): 346-355 (2012)Scalable Directory Service for IoT Applications., , , and . IEEE Commun. Stand. Mag., 1 (3): 58-65 (2017)Automatic Construction of Name-Bound Virtual Networks for IoT and its Management., , , , and . J. Inf. Process., (2018)Repeated Leader Follower Game for Managing Cloud Networks With Limited Resources., , , and . IEEE Access, (2019)Identity based architecture for secure communication in future internet., , , and . Digital Identity Management, page 45-48. ACM, (2010)Information-Centric Networking Future Internet Video Delivery., , and . User-Centric and Information-Centric Networking and Services, CRC Press, (2019)Consideration On Automation of 5G Network Slicing with Machine Learning., , , and . Kaleidoscope, page 1-8. IEEE, (2018)A Genetic Approach to Continuous Optimization of Virtual Network Embedding., , and . ICIN, page 70-74. IEEE, (2021)Filtering observations to improve resource control in virtual computer and network systems., , and . NOMS, page 1-7. IEEE, (2018)Research and experimentation with the HIMALIS network architecture for future internet., , and . Future Network & Mobile Summit, page 1-8. IEEE, (2012)