Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social-aware D2D communications: qualitative insights and quantitative analysis., , , , and . IEEE Communications Magazine, 52 (6): 150-158 (2014)Software Defined Networking (Dagstuhl Seminar 12363)., and . Dagstuhl Reports, 2 (9): 95-108 (2012)Writing on the clean slate: Implementing a socially-aware protocol in Haggle., , , and . WOWMOM, page 1-6. IEEE Computer Society, (2008)An architecture enabling BluetoothTM/JiniTM interoperability., , and . PIMRC, page 3013-3018. IEEE, (2004)Location prediction for large scale urban vehicular mobility., , , , and . IWCMC, page 1733-1737. IEEE, (2013)An optimal distributed malware defense system for mobile networks with heterogeneous devices., , , , and . SECON, page 314-322. IEEE, (2011)An Automatic, Robust, and EfficientMulti-User Breadcrumb Systemfor Emergency Response Applications., , , , , , , and . IEEE Trans. Mob. Comput., 13 (4): 723-736 (2014)Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices., , , , and . IEEE Trans. Mob. Comput., 13 (2): 377-391 (2014)Is the Same Instance Type Created Equal? Exploiting Heterogeneity of Public Clouds., , , , , , and . IEEE Trans. Cloud Computing, 1 (2): 201-214 (2013)A Mobile Peer to Peer Content Dissemination Model to Minimize Load on Cellular Network., and . IIKI, page 272-275. IEEE, (2015)