Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GRaTIS: Free Bits in the Network., , , and . IEEE Trans. Mob. Comput., 14 (1): 72-85 (2015)Identifying Opportunities for Exploiting Cross-Layer Interactions in Adaptive Wireless Systems., , and . Adv. in MM, (2007)Multichannel Wormhole Switching vs. CSMA/CA for Wireless Mesh Networking., , and . WCNC, page 2105-2110. IEEE, (2008)Self-organized context-aware hybrid MANETs., , and . WONS, page 128-130. IEEE, (2013)BitStalker: Accurately and efficiently monitoring bittorrent traffic., , , and . WIFS, page 181-185. IEEE, (2009)GRaTIS: Sensing and intelligence for performance in the presence of legacy networks., , , and . CrownCom, page 42-47. ICST / IEEE, (2012)Robust Coverage and Performance Testing for Large-Area Wireless Networks., , , and . AccessNets, volume 6 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 457-469. Springer, (2008)Modeling directionality in wireless networks: extended abstract., , , , and . SIGMETRICS, page 443-444. ACM, (2008)Cybersecurity education in a developing nation: the Ecuadorian environment., , and . J. Cybersecurity, 5 (1): tyz001 (2019)A Survey of Wireless Path Loss Prediction and Coverage Mapping Methods., , and . IEEE Communications Surveys and Tutorials, 15 (1): 255-270 (2013)