Author of the publication

Splitting Control-User Plane on Communication Protocol for Spotty Network.

, , , and . MobiArch, page 26-31. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Data Processing Scheme for Wireless Sensor Network Monitoring Using a Machine Learning Model., , and . ICMU, page 1-4. IEEE, (2018)CoNAT: A network coding-based interest aggregation in content centric networks., , , and . ICC, page 5715-5720. IEEE, (2015)Name-based push/pull message dissemination for disaster message board., , , , , , , and . LANMAN, page 1-6. IEEE, (2016)Mean free path applied to message dissemination in opportunistic networks., , , and . INFOCOM Workshops, page 420-425. IEEE, (2015)Integration of Network and Artificial Intelligence toward the Beyond 5G/6G Networks., , , and . IEICE Trans. Commun., 106 (12): 1267-1274 (December 2023)Towards an incremental deployment of NDN: robust bootstrapping using in-network indirection., , and . ICN, page 171-173. ACM, (2022)Utilization of Content-Centric Networking for 60 GHz Spotty Networks., , and . ICN, page 223-224. ACM, (2016)An Anomaly Detection Approach by AIML in IP Networks with eBPF-Based Observability., , , and . APNOMS, page 171-176. IEEE, (2023)A Scalable and Efficient Client Emulation Method for IP Multicast Performance Evaluation., , , and . AINA Workshops (1), page 142-147. IEEE Computer Society, (2007)Analysis and Application of Passive Peer Influence on Peer-to-Peer Inter-Domain Traffic., , and . Peer-to-Peer Computing, page 142-150. IEEE Computer Society, (2004)