Author of the publication

Self-adaptive handoff management for mobile streaming continuity.

, , , and . IEEE Trans. Netw. Serv. Manag., 6 (2): 80-94 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comprehensive study on software aging across android versions and vendors., , , and . Empir. Softw. Eng., 25 (5): 3357-3395 (2020)Dependability Assessment of the Android OS through Fault Injection., , , and . CoRR, (2019)Privacy Preserving Intrusion Detection Via Homomorphic Encryption., , , , , , and . WETICE, page 321-326. IEEE, (2019)Towards Cognitive Security Defense from Data., , and . DSN (Supplements), page 11-12. IEEE, (2019)Effective Fault Treatment for Improving the Dependability of COTS and Legacy-Based Applications., , , and . IEEE Trans. Dependable Secur. Comput., 1 (4): 223-237 (2004)Who Evaluates the Evaluators? On Automatic Metrics for Assessing AI-based Offensive Code Generators., , , , and . CoRR, (2022)Automating the Correctness Assessment of AI-generated Code for Security Contexts., , , , and . CoRR, (2023)Virtualizing mixed-criticality systems: A survey on industrial trends and issues., , , and . Future Gener. Comput. Syst., (2022)Virtualizing Mixed-Criticality Systems: A Survey on Industrial Trends and Issues., , , and . CoRR, (2021)Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study., , , and . CoRR, (2022)