Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the impact of user mobility on peer-to-peer video streaming., , , , , , , and . IEEE Wireless Commun., 15 (6): 54-62 (2008)Context adaptation in delay and disruption tolerant networks., , , and . GIIS, page 1-6. IEEE, (2012)Neighbor discovery time in schedule-based asynchronous duty cycling., , , and . Wireless Days, page 1-3. IEEE, (2012)Towards a Blockchain-Based Secure Electronic Medical Record for Healthcare Applications., , , , , , , , , and . ICC, page 1-6. IEEE, (2019)A Survey of Application-level Multicast Group Communication and a Proposal for Intelligent Reflectors., and . Net-Con, volume 213 of IFIP, page 117-126. Springer, (2006)Fault detection and diagnosis for solar-powered Wireless Mesh Networks using machine learning., , , , , and . IM, page 456-462. IEEE, (2017)Collision probability estimation in wireless networks., , and . LATINCOM, page 1-6. IEEE, (2016)Saving Resources in Discovery Protocol on Delay-Sensitive Rescue Mobile Networks., , , and . AINA, page 538-545. IEEE Computer Society, (2017)A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack., , , and . Security and Communication Networks, (2018)Practical Evaluation of a Secure Key-Distribution and Storage Scheme for Wireless Sensor Networks Using TinyOS., , , and . CLEI Electron. J., (2011)