Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A topology for service discovery over multiple administrative domains., , and . ICON, page 395-400. IEEE, (2002)Virtualized Application Function Chaining: Maximizing the Wearable System Lifetime., , and . CoRR, (2018)Conservative Plane Releasing for Spatial Privacy Protection in Mixed Reality., , and . CoRR, (2020)MAP2P: An Architecture Supporting Gnutella for Mobile Devices., , , and . IEICE Trans. Inf. Syst., 88-D (9): 2079-2088 (2005)Realistic data transfer scheduling with uncertainty., , , and . Comput. Commun., 34 (9): 1055-1065 (2011)Dirichlet-Based Initial Trust Establishment for Personal Space IoT Systems., , and . ICC, page 1-6. IEEE, (2018)Initial trust establishment for personal space IoT systems., , , and . INFOCOM Workshops, page 784-789. IEEE, (2017)Participatory Mobile Social Network Simulation Environment., , and . ICC, page 1-6. IEEE, (2010)Detection of anomalous vehicles using physics of traffic., , , , and . Veh. Commun., (2021)Federated Learning for Internet of Things: A Comprehensive Survey., , , , , and . IEEE Commun. Surv. Tutorials, 23 (3): 1622-1658 (2021)