Author of the publication

Interference-aware opportunistic relay selection.

, , and . StudentWorkshop@CoNEXT, page 11:1-11:2. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survey of Public Transport Routes using Wi-Fi., , and . VEHITS, page 168-177. SciTePress, (2018)Citizen Controlled Exchange of Information in e-Government., , and . WEBIST, page 494-499. SciTePress, (2011)Opportunistic Relay Selection for Wireless Cooperative Network., , and . NTMS, page 1-4. IEEE, (2012)Pseudonymisation with Break-the-Glass Compatibility for Health Records in Federated Services., , and . BIBE, page 274-277. IEEE, (2019)Usage of HTTPS by Municipal Websites in Portugal., , , and . WorldCIST (2), volume 931 of Advances in Intelligent Systems and Computing, page 155-164. Springer, (2019)Privacy Policies in Web Sites of Portuguese Municipalities: An Empirical Study., , and . WorldCIST, volume 206 of Advances in Intelligent Systems and Computing, page 87-96. Springer, (2013)Citizen-side Handling of Life Event Services., , and . WEBIST, page 565-570. SciTePress, (2012)Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags., , and . RFIDSec, volume 8651 of Lecture Notes in Computer Science, page 36-53. Springer, (2014)Authentication of Professionals in the RTS E-Health System., , and . HEALTHINF (1), page 72-80. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2008)A Negative Selection Approach to Intrusion Detection., , , and . ICARIS, volume 7597 of Lecture Notes in Computer Science, page 178-190. Springer, (2012)