Author of the publication

Resilient tree-based live streaming for mobile scenarios.

, , and . PerCom Workshops, page 160-162. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Approach for Mining Top-Rank-k Erasable Itemsets., , , and . ACIIDS (1), volume 8397 of Lecture Notes in Computer Science, page 73-82. Springer, (2014)OSSim: a generic simulation framework for overlay streaming., , and . SummerSim, page 30. Society for Computer Simulation International / ACM DL, (2013)EIFDD: An efficient approach for erasable itemset mining of very dense datasets., , , and . Appl. Intell., 43 (1): 85-94 (2015)A heuristics approach to mine behavioural data logs in mobile malware detection system., , , and . Data Knowl. Eng., (2018)SWAP: Protecting pull-based P2P video streaming systems from inference attacks., , , and . WoWMoM, page 1-9. IEEE Computer Society, (2016)Effective Computation Resilience in High Performance and Distributed Environments., , , , , and . Comput. Informatics, 35 (6): 1386-1415 (2016)Fluid approach to two-sided reflected Markov-modulated Brownian motion., and . Queueing Syst., 80 (1-2): 105-125 (2015)Practical synchronization techniques for multi-channel MAC., , and . MobiCom, page 134-145. ACM, (2006)Fast algorithms for mining maximal erasable patterns., , and . Expert Syst. Appl., (2019)Discovering Erasable Closed Patterns., , , and . ACIIDS (1), volume 9011 of Lecture Notes in Computer Science, page 368-376. Springer, (2015)