Author of the publication

Using ORBIT for evaluating wireless content-centric network transport.

, , , , , and . WiNTECH@MobiCom, page 103-104. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards flat and distributed mobility management: A 3GPP evolved network design., , and . ICC, page 6855-6861. IEEE, (2012)Providing explicit congestion control and multi-homing support for content-centric networking transport., , , , , and . Computer Communications, (2015)Protocols and system capacity of relay-enhanced HSDPA systems., , , and . CISS, page 179-184. IEEE, (2008)Mobile Edge Cloud System: Architectures, Challenges, and Approaches., , , , , and . IEEE Systems Journal, 12 (3): 2495-2508 (2018)Exploiting the physical layer for enhanced security., , , , , , , and . IEEE Wireless Commun., 17 (5): 63-70 (2010)Practical service allocation in mobile edge computing systems., , and . ITNAC, page 1-6. IEEE Computer Society, (2017)Performance analysis of a grid-tied inverter for renewable energy applications., , , and . IECON, page 4981-4987. IEEE, (2014)PHY-Authentication Protocol for Spoofing Detection in Wireless Networks., , , , , , and . GLOBECOM, page 1-6. IEEE, (2010)Using ORBIT for evaluating wireless content-centric network transport., , , , , and . WiNTECH@MobiCom, page 103-104. ACM, (2013)Radio-telepathy: extracting a secret key from an unauthenticated wireless channel., , , , and . MobiCom, page 128-139. ACM, (2008)