Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A policy-based approach to firewall management., and . Net-Con, volume 235 of IFIP Conference Proceedings, page 115-126. Kluwer, (2002)Track on Computer Networks: editorial message., , , and . SAC, page 2040. ACM, (2008)A Cross-Layer Routing Scheme for Scalable Triple Play Service in Wireless Mesh Networks., , and . ICCCN, page 1-6. IEEE, (2010)Q3M - QoS Architecture for Multi-user Mobile Multimedia Sessions in 4G systems., , , , , and . MMNS, volume 4787 of Lecture Notes in Computer Science, page 38-49. Springer, (2007)Quality of Experience Adaptation Controllers for Voice and Video in Wireless Networks., , and . WWIC, volume 6649 of Lecture Notes in Computer Science, page 350-361. Springer, (2011)A Unifying Architecture for Publish-Subscribe Services in the Next Generation IP Networks., , , , , and . GLOBECOM, IEEE, (2006)HyPath: An Approach for Hybrid On-Path Off-Path End-to-End Signaling., , , and . GLOBECOM, page 1691-1696. IEEE, (2008)A Europe-Brazil Context for Secure Data Analytics in the Cloud., , , , , , and . IEEE Secur. Priv., 16 (6): 52-60 (2018)Current and Future Trends in Mobile Device Forensics: A Survey., , , and . ACM Comput. Surv., 51 (3): 46:1-46:31 (2018)RAILoB - a Routing Algorithm for Inter-cluster Load Balancing in Wireless Mesh Networks., , , and . CCNC, page 904-909. IEEE, (2012)