Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding the delay and loss tradeoffs in large wireless military networks using queuing analysis and MAC models., , , , and . MILCOM, page 1-6. IEEE, (2012)Cooperative Recovery in Heterogeneous Mobile Networks., , , , , and . SECON, page 395-403. IEEE, (2008)Resource Allocation and Performance Study for LTE Networks Integrated with Femtocells., , , and . GLOBECOM, page 1-6. IEEE, (2010)Aggregated Bloom Filters for Intrusion Detection and Prevention Hardware., , , and . GLOBECOM, page 349-354. IEEE, (2007)Automatic over-the-air provisioning for Wi-Fi equipped M2M devices., , , , and . LCN, page 675-678. IEEE Computer Society, (2013)Planning & design of routing architectures for multi-tier military networks., , , , , and . MILCOM, page 1-7. IEEE, (2012)Tuning of reinforcement learning parameters applied to OLSR using a cognitive network design tool., , , , and . WCNC, page 2786-2791. IEEE, (2012)Scalable Registration and Discovery of Devices in Low-Bandwidth Tactical Networks., , , , , , and . MILCOM, page 550-555. IEEE, (2013)Realizing Secure Cellular and Mobile Hot-Spot Extension to Tactical Networks., , , , , , , , , and . MILCOM, page 674-679. IEEE, (2013)A GNU-based packet radio for network management field testing., , , , , , , and . MILCOM, page 1-6. IEEE, (2012)