Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Afifi, Hossam
add a person with the name Afifi, Hossam
 

Other publications of authors with the same name

Hash Chain Links Resynchronization Methods in Video Streaming Security: Performance Comparison., , and . J. Mobile Multimedia, 7 (1&2): 89-112 (2011)Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks., , , and . ESAS, volume 4357 of Lecture Notes in Computer Science, page 32-42. Springer, (2006)Toward Feasibility and Scalability of Session Initiation and Dynamic QoS Provisioning in Policy-Enabled Networks., , , , , , , and . NETWORKING, volume 3462 of Lecture Notes in Computer Science, page 277-288. Springer, (2005)Improving Congestion Avoidance Algorithms for Asymmetric Networks., , and . ICC (3), page 1417-1421. IEEE, (1997)Mobile Data Network Analysis Platform., , , and . HotPlanet@MobiCom, page 13-18. ACM, (2015)A trial towards unifying control protocols: COPS versus Radius/DIAMETER and Mobile IP., , , and . MWCN, page 537-541. IEEE, (2002)Optimization of File Allocation for Video Sharing Servers., and . NTMS, page 1-5. IEEE, (2009)A Cross-layer Aware Imprinting Protocol for Personal Networks., and . ICNS, page 51. IEEE Computer Society, (2007)Improving Routing Reliability on Wireless Sensors Network with Emergency Paths., , and . ICDCS Workshops, page 545-550. IEEE Computer Society, (2008)Dynamic Aggregation Protocol for Wireless Sensor Networks., , , and . AINA, page 356-361. IEEE Computer Society, (2013)