Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perception-aware packet-loss resilient compression for networked haptic systems., , , and . Computer Communications, 36 (15-16): 1621-1628 (2013)The average capacitor current method for delay calculation in MOS circuits.. IEEE Trans. Education, 47 (3): 330-339 (2004)Energy-Efficient Security for Voice over IP., , , , and . I. J. Network Security, 17 (1): 7-22 (2015)ServBGP: BGP-inspired autonomic service routing for multi-provider collaborative architectures in the cloud., , , , and . Future Generation Comp. Syst., (2014)Edge computing enabling the Internet of Things., , , and . WF-IoT, page 603-608. (2015)Statistical methodology for modeling non-IID memory fails events., , , , and . ISQED, page 205-211. IEEE, (2014)A design methodology for energy aware neural networks., , , , , and . IWCMC, page 1333-1340. IEEE, (2011)Mutual Authentication Scheme for EPC Tags-Readers in the Supply Chain., , , and . NTMS, page 1-5. IEEE, (2009)On cellular network planning and operation with M2M signalling and security considerations., , , and . ICC Workshops, page 429-434. IEEE, (2014)Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices., , and . SecureComm, page 240-242. IEEE, (2005)