Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust-based authentication scheme with user rating for low-resource devices in smart environments., , , and . Personal and Ubiquitous Computing, 17 (5): 1013-1023 (2013)Towards a robust privacy and anonymity preserving architecture for ubiquitous computing., , , and . CRiSIS, page 125-132. IEEE, (2008)Performance Evaluation of Dual Carrier Feature in the Uplink of HSPA+ Systems., , , and . VTC Fall, page 1-5. IEEE, (2012)Practical implementation of Mobile TV delivery in cooperative LTE/DVB networks., , , and . WiOpt, page 662-666. IEEE, (2014)A complete and accurate analytical model for 802.11e EDCA under saturation conditions., , and . AICCSA, page 800-807. IEEE Computer Society, (2009)Effect of Transmission Opportunity Limit on Transmission Time Modeling in 802.11e., , and . IPOM, volume 4786 of Lecture Notes in Computer Science, page 156-167. Springer, (2007)Integrated fault tolerance framework for wireless sensor networks., , , , and . ICT, page 1-6. IEEE, (2012)Impact of LTE and DVB-NGH cooperation on QoS of Mobile TV users., , , and . ICC, page 3672-3677. IEEE, (2013)The Design of Fast Asynchronous Adder Structures and their Implementation Using D.C.V.S. Logic., and . ISCAS, page 291-294. IEEE, (1994)Impact of Playout Buffering on Mobile TV Performance., , , and . IEEE Trans. Mob. Comput., 15 (2): 377-391 (2016)