Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling the Network Topology.. Modeling and Tools for Network Simulation, Springer, (2010)P2P Mobile Multimedia Group Conferencing: Combining SIP, SSM and Scalable Adaptive Coding for Heterogeneous Networks., , , and . International Conference on Computational Science (4), volume 4490 of Lecture Notes in Computer Science, page 761-764. Springer, (2007)Demonstration abstract: simply RIOT: teaching and experimental research in the internet of things., , , , and . IPSN, page 329-330. IEEE/ACM, (2014)Gain More for Less: The Surprising Benefits of QoS Management in Constrained NDN Networks., , , , , and . CoRR, (2019)Bridge the Gap: Measuring and Analyzing Technical Data for Social Trust between Smartphones, , and . CoRR, (2012)Why We Shouldn't Forget Multicast in Name-oriented Publish/Subscribe, and . CoRR, (2012)A Survey on Honeypot Software and Data Analysis., , , , and . CoRR, (2016)Information-Centric Networking (ICN) Research Challenges., , , , , , , and . RFC, (July 2016)AuthoCast - a mobility-compliant protocol framework for multicast sender authentication., , , and . Security and Communication Networks, 1 (6): 495-509 (2008)Videokommunikation im Internet - Vorschläge zu ihrer Verbreitung., , , and . DFN-Arbeitstagung über Kommunikationsnetze, volume P-17 of LNI, page 185-195. GI, (2002)