Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest editor introduction.. ACM SIGMOBILE Mob. Comput. Commun. Rev., 12 (1): 55 (2008)Hardware-Assisted, Low-Cost Video Transcoding Solution in Wireless Networks., and . IEEE Trans. Mob. Comput., 19 (3): 581-597 (2020)Joint Multicell Beamforming and Client Association in OFDMA Small-Cell Networks., , , , and . IEEE Trans. Mob. Comput., 15 (9): 2260-2274 (2016)Load balancing in large-scale RFID systems., , , , , and . Comput. Networks, 52 (9): 1782-1796 (2008)OMNI: An efficient overlay multicast infrastructure for real-time applications., , , , and . Comput. Networks, 50 (6): 826-841 (2006)Designing and connectivity checking of implicit social networks from the user-item rating data.. Multim. Tools Appl., 80 (17): 26615-26635 (2021)VoltKey: Continuous Secret Key Generation Based on Power Line Noise for Zero-Involvement Pairing and Authentication., , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (3): 93:1-93:26 (2019)AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication., , , , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (1): 20:1-20:29 (2022)A Resource Management System for Interference Mitigation in Enterprise OFDMA Femtocells., , , , and . IEEE/ACM Trans. Netw., 21 (5): 1447-1460 (2013)MobilityFirst: a mobility-centric and trustworthy internet architecture., , , , , and . Comput. Commun. Rev., 44 (3): 74-80 (2014)