Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe., , and . TrustCom/BigDataSE/ISPA (1), page 1403-1410. IEEE, (2015)MAC Layer and Scalability Aspects of Vehicular Communication Networks., , , , and . VANET, Wiley, (2010)Do online social network friends still threaten my privacy?, , , and . CODASPY, page 13-24. ACM, (2013)A change in perspective: information-centric modeling of inter-vehicle communication., , , and . Vehicular Ad Hoc Networks, page 61-66. ACM, (2011)GPU-Based Architectures and Their Benefit for Accurate and Efficient Wireless Network Simulations., , and . MASCOTS, page 421-424. IEEE Computer Society, (2011)Understanding differences in MAC performance., , , and . WoWMoM, page 1-6. IEEE Computer Society, (2014)Adjusting transmission power and packet generation rate of periodic status information messages in VANETs., and . Vehicular Ad Hoc Networks, page 90-91. ACM, (2006)Is CSMA able to coordinate multiple access in vehicular radio channels effectively?, and . ITST, page 801-806. IEEE, (2012)Enabling Accurate Cross-Layer PHY/MAC/NET Simulation Studies of Vehicular Communication Networks., , , and . Proceedings of the IEEE, 99 (7): 1311-1326 (2011)Characterization, avoidance and repair of packet collisions in inter-vehicle communication networks.. Karlsruhe Institute of Technology, (2012)