Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Monteiro, Edmundo
add a person with the name Monteiro, Edmundo
 

Other publications of authors with the same name

A policy-based approach to firewall management., and . Net-Con, volume 235 of IFIP Conference Proceedings, page 115-126. Kluwer, (2002)Outsourced management of home and SOHO Windows desktops., , , , and . CNSM, page 1-7. IEEE, (2011)Enhanced protection of hidden primary users through filtering based on suspect channels classification., and . WiMob, page 419-426. IEEE Computer Society, (2012)Evaluation of an Overlay for Source-Specific Multicast in Asymmetric Routing Environments., , and . GLOBECOM, page 1987-1992. IEEE, (2007)Experimental Evaluation of the Source Specific Multicast Model in Mobile Environments., , and . WOWMOM, page 542-547. IEEE Computer Society, (2006)Virtualizing Programmable Logic Controllers: Toward a Convergent Approach., , and . Embedded Systems Letters, 8 (4): 69-72 (2016)Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence., , , and . IEEE Access, (2018)EuQoS: End-to-End Quality of Service over Heterogeneous Networks., , , , , , , , , and 4 other author(s). Computer Communications, 32 (12): 1355-1370 (2009)Cross-layer routing metrics for mesh networks: Current status and research directions., , and . Computer Communications, 34 (6): 681-703 (2011)Research challenges in QoS routing., , , , , , , , , and 5 other author(s). Computer Communications, 29 (5): 563-581 (2006)