Author of the publication

Application of Information Centric Networking to NoSQL databases: The spatio-temporal use case.

, , , , , , and . LANMAN, page 1-6. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The one-out-of-k retrieval problem and linear network coding., , , , and . Adv. Math. Commun., 10 (1): 95-112 (2016)Opportunistic communication in smart city: Experimental insight with small-scale taxi fleets as data carriers., , , , , and . Ad Hoc Networks, (2016)A Theory-Driven Distribution Algorithm for Peer-to-Peer Real Time Streaming., , , , , and . GLOBECOM, page 2291-2296. IEEE, (2008)Performance Assessment of an Epidemic Protocol in VANET Using Real Traces., , , , , and . MoWNet, volume 40 of Procedia Computer Science, page 92-99. Elsevier, (2014)Application of Information Centric Networking to NoSQL databases: The spatio-temporal use case., , , , , , and . LANMAN, page 1-6. IEEE, (2017)eBPF Programming Made Easy with eCLAT., , , , , and . CNSM, page 28-36. IEEE, (2022)OPSS: an overlay peer-to-peer streaming simulator for large-scale networks., , , and . SIGMETRICS Perform. Evaluation Rev., 35 (3): 25-27 (2007)UHF RFID and NFC Point-of-Care - Architecture, Security, and Implementation., , , , , , , , and . CoRR, (2023)Modeling LRU cache with invalidation., , , and . Comput. Networks, (2018)Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications., , and . Future Internet, 10 (2): 13 (2018)