Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource control for hybrid code and time division scheduling.. PIMRC, page 1772-1776. IEEE, (2004)Enhancing mobile data offloading with mobility prediction and prefetching., and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 17 (1): 22-29 (2013)Adapting Data Popularity in Mobility-Based Proactive Caching Decisions for Heterogeneous Wireless Networks., and . EAI Endorsed Trans. Cloud Syst., 2 (7): e3 (2016)Wireless Systems Cell dimensioning in the CDMA uplink based on economic modelling.. Eur. Trans. Telecommun., 18 (4): 427-433 (2007)Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection., , , and . Wirel. Commun. Mob. Comput., 15 (2): 276-294 (2015)Adapting data popularity in mobility-based proactive caching decisions for heterogeneous wireless networks., and . QSHINE, page 191-192. IEEE, (2014)IoT Resource Access utilizing Blockchains and Trusted Execution Environments., , , , and . GIoTS, page 1-6. IEEE, (2019)OAuth 2.0 authorization using blockchain-based tokens., , , , and . CoRR, (2020)Experiences with a metropolitan multiradio wireless mesh network: design, performance, and application., , and . IEEE Communications Magazine, 50 (7): 128-136 (2012)I-CAN: Information-centric future mobile and wireless access networks., , , , and . QSHINE, page 139-141. IEEE, (2014)