Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Pissinou, Niki
add a person with the name Pissinou, Niki
 

Other publications of authors with the same name

Encapsulation of ATM cell connections., , and . Computer Communications, 19 (8): 623-627 (1996)Game theoretic analysis of users and providers behavior in network under scarce resources., , , , and . ICNC, page 1149-1155. IEEE Computer Society, (2012)On Optimizing Compatible Security Policies in Wireless Networks., , and . EURASIP J. Wireless Comm. and Networking, (2006)A future location-aware replacement policy for the cache management at the mobile terminal., , , and . Wireless Communications and Mobile Computing, 9 (5): 607-629 (2009)Spatio-Temporal Composition of Video Objects: Representation and Querying in Video Database Systems., , , and . IEEE Trans. Knowl. Data Eng., 13 (6): 1033-1040 (2001)Spatio-Temporal Modeling in Video and Multimedia Geographic Information Systems., , and . GeoInformatica, 5 (4): 375-409 (2001)On Quality Of Service Routing in Ad-Hoc Networks., , and . LCN, page 276-278. IEEE Computer Society, (2003)On Algorithms for Mutual Exclusion in Distributed Systems., , , and . ICPP (2), page 149-152. CRC Press, (1992)The secure model for enterprise connectivity., , and . ICCCN, page 176-182. IEEE, (2000)On Routing algorithms in Ad-hoc Networks., , and . International Conference on Internet Computing, page 983-990. (2002)