Author of the publication

Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution.

, , and . Pervasive and Mobile Computing, 4 (5): 633-657 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QoS-based Architectures for Geographically Replicated Web Servers., , and . Cluster Computing, 4 (2): 109-120 (2001)Content Delivery Policies in Replicated Web Services: Client-Side vs. Server-Side., , and . Cluster Computing, 8 (1): 47-60 (2005)Towards Scalable P2P Computing for Mobile Ad Hoc Networks., , and . PerCom Workshops, page 109-116. IEEE Computer Society, (2004)Wi-Fi in Ad Hoc Mode: A Measurement Study., , , and . PerCom, page 145-154. IEEE Computer Society, (2004)A localized de-synchronization algorithm for periodic data reporting in IEEE 802.15.4 WSNs., , and . ISCC, page 605-610. IEEE Computer Society, (2012)Reliability and energy efficiency in multi-hop IEEE 802.15.4/ZigBee Wireless Sensor Networks., , , and . ISCC, page 336-341. IEEE Computer Society, (2010)Mobile edge clouds for Information-Centric IoT services., , , , and . ISCC, page 422-428. IEEE Computer Society, (2016)The role of the RPL routing protocol for smart grid communications., , and . IEEE Communications Magazine, 51 (1): 75-83 (2013)Mobile ad hoc networking: milestones, challenges, and new research directions., and . IEEE Communications Magazine, 52 (1): 85-96 (2014)Client-side content delivery policies in replicated web services: parallel access versus single server approach., , and . Perform. Eval., (2005)