Author of the publication

Combinatorial Auction-Based Resource Allocation in the Fog.

, , and . EWSDN, page 62-67. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multimodal QoE evaluation in P2P-based IPTV systems., , , , and . ACM Multimedia, page 1321-1324. ACM, (2011)Evaluating the Real-World Performance of 5G Fixed Wireless Broadband in Rural Areas., , , and . 5G World Forum, page 465-470. IEEE, (2019)Practical Intrusion Detection of Emerging Threats., , , and . IEEE Trans. Netw. Serv. Manag., 19 (1): 582-600 (2022)To All Intents and Purposes: Towards Flexible Intent Expression., , , and . NetSoft, page 31-37. IEEE, (2021)Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems., , , , , and . CPSIOTSEC@CCS, page 63-68. ACM, (2021)Safe and Secure Software-Defined Networks for Smart Electricity Substations., , , , and . ACIIDS (Companion), volume 1178 of Communications in Computer and Information Science, page 179-191. Springer, (2020)Just Browsing?: Understanding User Journeys in Online TV., , , and . ACM Multimedia, page 965-968. ACM, (2014)P2P-Based IPTV Services: Design, Deployment, and QoE Measurement., , , , , , and . IEEE Trans. Multim., 14 (6): 1515-1527 (2012)Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security., , , and . Comput. Secur., (2022)Reconciling community resource requirements in U-Nets., , , , and . U-NET@CoNEXT, page 19-24. ACM, (2009)