Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling directionality in wireless networks: extended abstract., , , , and . SIGMETRICS, page 443-444. ACM, (2008)A Survey on Biologically Inspired Algorithms for Computer Networking., and . IEEE Commun. Surv. Tutorials, 15 (3): 1160-1191 (2013)Selective encryption for consumer applications., and . IEEE Commun. Mag., 42 (5): 124-129 (2004)GRaTIS: Free Bits in the Network., , , and . IEEE Trans. Mob. Comput., 14 (1): 72-85 (2015)Identifying Opportunities for Exploiting Cross-Layer Interactions in Adaptive Wireless Systems., , and . Adv. Multim., (2007)Multichannel Wormhole Switching vs. CSMA/CA for Wireless Mesh Networking., , and . WCNC, page 2105-2110. IEEE, (2008)BitStalker: Accurately and efficiently monitoring bittorrent traffic., , , and . WIFS, page 181-185. IEEE, (2009)MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs., , , , and . MobiSys, page 191-204. ACM, (2006)Robust Coverage and Performance Testing for Large-Area Wireless Networks., , , and . AccessNets, volume 6 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 457-469. Springer, (2008)Self-organized context-aware hybrid MANETs., , and . WONS, page 128-130. IEEE, (2013)