Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Encrypted Domain Processing for Cloud Privacy - Concept and Practical Experience., , , , , and . CLOSER, page 591-596. SciTePress, (2011)Approximation to Nanosecond Optical Switching Based on Commercial Devices., , , and . GLOBECOM, page 1-6. IEEE, (2011)Targeted aspect-based emotion analysis to detect opportunities and precaution in financial Twitter messages., , , and . Expert Syst. Appl., (May 2023)Decoupled Active/Passive Base Stations for Second Generation Cellular Networks., , , , , and . Wirel. Pers. Commun., 56 (2): 255-275 (2011)Fast image recovery using dynamic load balancing in parallel architectures, by means of incomplete projections., , , and . IEEE Trans. Image Processing, 10 (4): 493-499 (2001)Real-time 3G UMTS terminal detection., , , and . IEEE Communications Letters, 6 (3): 123-125 (2002)On the Feasibility of Mobile Video Services for IEEE 802.11b Multicast Networks., , , , and . MATA, volume 3284 of Lecture Notes in Computer Science, page 295-303. Springer, (2004)Agent-Driven Resource Optimization in User Networks: A Game Theoretical Approach., , , and . ACRI, volume 3305 of Lecture Notes in Computer Science, page 335-344. Springer, (2004)A packet snif.ng and synchronization technique to boost P2P satellite networks., , , , and . HOT-P2P, page 28-32. IEEE Computer Society, (2005)Emulating Access Grid features at web endpoints., , , and . GCC, page 507-512. IEEE Computer Society, (2007)