Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Softwire Security Analysis and Requirements., , , and . RFC, (August 2009)Implementation and Evaluation of Handoff Method between Access Nodes for P2PSIP and IMS Cooperating Networks., , and . ICCCN, page 1-6. IEEE, (2010)Design of Session State Migration Middleware for Disruption-Free Services., , , , , and . NGMAST, page 93-99. IEEE, (2012)On Handover Procedure with Data Forwarding for Reducing Buffered User Data in Base Stations., , and . GLOBECOM, page 1-8. IEEE, (2009)On Locating Loss Links of Signaling Messages in SIP-Based Services., , , , and . GLOBECOM, page 1-7. IEEE, (2009)Study and Implementation of Dynamic Network Composition in Heterogeneous Network Environments., and . J. Inf. Process., (2009)Gap Analysis and Deployment Architectures for 3GPP2 MMD Networks., , , , , and . IEEE Veh. Technol. Mag., 2 (1): 35-42 (2007)Services Composition Based on Next-Generation Service Overlay Networks Architecture., , , , , , , , and . NTMS, page 1-6. IEEE, (2011)Reliable delivery route computation for threshold secret shared content., and . DRCN, page 1-8. IEEE, (2014)Efficient Table Lookup Method for Performance Monitoring of VoIP Flows in Mobile Environment., , and . GLOBECOM, page 2420-2425. IEEE, (2008)