Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Architecture for End-to-End Quality of Service Provision and its Experimental Validation. University of Pennsylvania, Philadelphia, Pennsylvania, (1995)A hierarchical Quality of Service control architecture for configurable multimedia applications., , and . J. High Speed Networks, 9 (3-4): 153-174 (2000)Cross-Layer Design for Data Accessibility in Mobile Ad Hoc Networks., , and . Wireless Personal Communications, 21 (1): 49-76 (2002)Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks., , and . DCOSS, volume 4026 of Lecture Notes in Computer Science, page 202-217. Springer, (2006)SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad-hoc networks., , , , and . IEEE Trans. Inf. Forensics Secur., 4 (1): 140-150 (2009)ShoesLoc: In-Shoe Force Sensor-Based Indoor Walking Path Tracking., , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (1): 31:1-31:23 (2019)Editorial.. Multim. Syst., 9 (4): 313-314 (2003)Editor's Note.. Multim. Syst., 9 (6): 491 (2004)Special issue from ACM NOSSDAV 2007., and . Multim. Syst., 15 (1): 1-2 (2009)End-to-end delay control of multimedia applications over multihop wireless links., , and . ACM Trans. Multim. Comput. Commun. Appl., 5 (2): 16:1-16:20 (2008)