Author of the publication

AdHoc Probe: end-to-end capacity probing in wireless ad hoc networks.

, , , , and . Wireless Networks, 15 (1): 111-126 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing robustness of vehicular networks using virtual frameworks., and . Telecommunication Systems, 58 (4): 329-348 (2015)An Enhanced Digital Content Mediator (DCM) Approach to Implementing Legitimate and Secure P2P Online Transactions., , , , , and . ICC, page 2351-2356. IEEE, (2006)Measuring link characteristics of power line communication systems., , , and . ICC, page 4321-4325. IEEE, (2013)An Analytical Approach to Optimizing the Utility of ESP Games., , , , and . Web Intelligence, page 184-187. IEEE Computer Society, (2008)Adaptive Video Streaming in Vertical Handoff: A Case Study., , , , and . MobiQuitous, page 111-112. IEEE Computer Society, (2004)Using known vectors to improve data dissemination in opportunistic networks., , , and . IJAHUC, 17 (1): 59-69 (2014)A Measurement Study of Path Capacity in 802.11b-based Wireless Networks., , , , and . WiTMeMo, USENIX Association, (2013)Bluetooth: carrying voice over ACL links., , , and . MWCN, page 379-383. IEEE, (2002)PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic Network., , and . AINA, page 112-119. IEEE Computer Society, (2010)The design of puzzle selection strategies for GWAP systems., , and . Concurrency and Computation: Practice and Experience, 22 (7): 890-908 (2010)