Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-protection in P2P Networks: Choosing the Right Neighbourhood., , , , , and . IWSOS/EuroNGI, volume 4124 of Lecture Notes in Computer Science, page 23-33. Springer, (2006)Bringing law and order to IEEE 802.11 networks - A case for DiscoSec., , , , and . Pervasive and Mobile Computing, 5 (5): 510-525 (2009)Use Cases, Enablers and Requirements for Evolved Femtocells., , , and . VTC Spring, page 1-5. IEEE, (2011)Minimizing contention through cooperation between densely deployed wireless LANs., , and . Wireless Networks, 15 (6): 741-754 (2009)Rope ladder routing: Position-based multipath routing for wireless mesh networks., , and . WOWMOM, page 1-6. IEEE Computer Society, (2010)Design, implementation, and performance analysis of DiscoSec - Service pack for securing WLANs., , , , and . WOWMOM, page 1-10. IEEE Computer Society, (2008)Cost analysis of initial deployment strategies for virtualized mobile core network functions., , , , and . IEEE Communications Magazine, 53 (12): 60-66 (2015)Traffic and Mobility Management in Networks of Femtocells., , , and . MONET, 17 (5): 662-673 (2012)Delay Bounds under Arbitrary Multiplexing: When Network Calculus Leaves You in the Lurch..., , and . INFOCOM, page 1669-1677. IEEE, (2008)A Comprehensive Worst-Case Calculus for Wireless Sensor Networks with In-Network Processing., , and . RTSS, page 193-202. IEEE Computer Society, (2007)