Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comparative study of MobilityFirst and NDN based ICN-IoT architectures., , , and . QSHINE, page 158-163. IEEE, (2014)On the Cache-and-Forward Network Architecture., , , , and . ICC, page 1-5. IEEE, (2009)Mining joules and bits: towards a long-life pervasive system., , , , and . IPDPS, page 1-8. IEEE, (2008)The Boomerang Protocol: Tying Data to Geographic Locations in Mobile Disconnected Networks., , , and . IEEE Trans. Mob. Comput., 11 (7): 1113-1126 (2012)Virtual wireless network mapping: An approach to housing MVNOs on wireless meshes., , and . PIMRC, page 187-191. IEEE, (2011)BlueGene/L Failure Analysis and Prediction Models., , , , and . DSN, page 425-434. IEEE Computer Society, (2006)Using ORBIT for evaluating wireless content-centric network transport., , , , , and . WiNTECH@MobiCom, page 103-104. ACM, (2013)Two-dimensional Anti-jamming Mobile Communication Based on Reinforcement Learning., , , , , and . CoRR, (2017)IoT Security Techniques Based on Machine Learning., , , , and . CoRR, (2018)Exploring Deep Learning for Efficient and Reliable Mobile Sensing., , , , and . IEEE Network, 32 (4): 6-7 (2018)