Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Review of Policy-Based Resource and Admission Control Functions in Evolving Access and Next Generation Networks., and . J. Network Syst. Manage., 16 (1): 14-45 (2008)Energy optimisation in heterogeneous multi-RAT networks., , , , , , and . ICIN, page 139-144. IEEE, (2011)Cross-Domain Network Slicing for Industrial Applications., , , , and . EuCNC, page 209-213. IEEE, (2018)Time Behaviour and Network Encumbrance Due to Authentication in Wireless Mesh Access Networks., , , and . VTC Spring, page 1219-1223. IEEE, (2007)VoIP Performance in "MeshBed" - a Wireless Mesh Networks Testbed., , , , , , and . VTC Spring, page 2218-2222. IEEE, (2008)Application service quality indication to end-users in IP based networks as added value service., , , , , , and . Future Network & Mobile Summit, page 1-10. IEEE, (2013)A Reactive Security Framework for operational wind parks using Service Function Chaining., , , , , , , , and . ISCC, page 663-668. IEEE Computer Society, (2017)Trust Level Based Data Storage and Data Access Control in a Distributed Storage Environment., , , , and . MobileCloud, page 169-176. IEEE Computer Society, (2015)Efficient Transmission of Smartphone Application Traffic in Wireless Access Networks., , , , , , , , , and . MobileCloud, page 186-193. IEEE Computer Society, (2014)