Author of the publication

Mobile Ad-Hoc Networks Integration in the Daidalos Architecture

, , , , , , , , and . IST Mobile and Wireless Communications Summit, Dresden, Germany, IST Mobile Summit 2005, (June 2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Routing in Ad Hoc Networks for Reactive Next Hop Routing Protocols., , , and . International Conference on Wireless Networks, page 109-115. CSREA Press, (2004)Mobile Ad-Hoc Networks Integration in the Daidalos Architecture, , , , , , , , and . IST Mobile and Wireless Communications Summit, Dresden, Germany, IST Mobile Summit 2005, (June 2005)Mobility with QoS in Broadcast Unidirectional Technologies: Experimental Validation., , , , and . ICC, page 1-6. IEEE, (2010)5GinFIRE: An end-to-end open5G vertical network function ecosystem., , , , , , , , , and 2 other author(s). Ad Hoc Networks, (2019)Smart Unmanned Aerial Vehicles as base stations placement to improve the mobile network operations., , , , , , , and . Comput. Commun., (2022)An IEEE 802.11p/WAVE implementation with synchronous channel switching for seamless dual-channel access (poster)., , , , , and . VNC, page 214-221. IEEE, (2011)Social-aware Opportunistic Routing Protocol based on User's Interactions and Interests., , and . CoRR, (2014)Context-Aware Connectivity and Mobility in Wireless Mesh Networks., and . MONAMI, volume 32 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 49-56. Springer, (2009)Channel Selection Relying on Probabilistic Adjacent Channel Interference Analysis and Pattern Recognition., and . Wireless Personal Communications, 86 (3): 1333-1357 (2016)A Characterization of Mobility Management in User-Centric Networks., , , and . NEW2AN, volume 6869 of Lecture Notes in Computer Science, page 314-325. Springer, (2011)