Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Social World of Twitter: Topics, Geography, and Emotions., , and . ICWSM, The AAAI Press, (2012)On next-generation telco-managed P2P TV architectures., , , and . IPTPS, page 5. USENIX, (2008)Multicast-specific security threats and counter-measures., and . NDSS, page 2-16. IEEE Computer Society, (1995)Implementing Real Time Packet Forwarding Policies Using Streams., , , , and . USENIX, page 71-82. USENIX Association, (1995)A combined admission and congestion control scheme for variable bit rate video., and . Distributed Systems Engineering, 1 (4): 242- (1994)Trustworthy Electronic Voting Using Adjusted Blockchain Technology., and . IEEE Access, (2019)A Survey of Incentive Mechanisms for Participatory Sensing., , , , , , , and . IEEE Communications Surveys and Tutorials, 17 (2): 918-943 (2015)Energy Management Techniques in Modern Mobile Handsets., and . IEEE Communications Surveys and Tutorials, 15 (1): 179-198 (2013)Multipoint Communication: A Survey of Protocols, Functions, and Mechanisms., , and . IEEE Journal on Selected Areas in Communications, 15 (3): 277-290 (1997)A Large-scale Behavioural Analysis of Bots and Humans on Twitter., , , and . TWEB, 13 (1): 7:1-7:23 (2019)