Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How a Secure and Open Mobile Agent Framework Suits Electronic Commerce Applications., , , and . WOA, page 13-18. Pitagora Editrice Bologna, (2000)Mobile Agents Protection in the Internet Environment., , and . COMPSAC, page 80-85. IEEE Computer Society, (1999)Policy-Driven Binding to Information Resources in Mobility-Enabled Scenarios., , , and . Mobile Data Management, volume 2574 of Lecture Notes in Computer Science, page 212-229. Springer, (2003)Supporting COTS applications in Tactical Edge Networks., , , , and . MILCOM, page 1-7. IEEE, (2012)Exploiting smart city IoT for disaster recovery operations., , , , , , , , , and 5 other author(s). WF-IoT, page 458-463. IEEE, (2018)Information-Centric Networking in next-generation communications scenarios., , , and . J. Network and Computer Applications, (2017)Java for On-line Distributed Monitoring of Heterogeneous Systems and Services., , and . Comput. J., 45 (6): 595-607 (2002)An integrated management environment for network resources and services., , and . IEEE Journal on Selected Areas in Communications, 18 (5): 676-685 (2000)Mobile agents and security: protocols for integrity., , , and . DAIS, volume 143 of IFIP Conference Proceedings, page 177-190. Kluwer, (1999)Mobility Pattern Prediction to Support Opportunistic Networking in Smart Cities., , , and . MOBILWARE, page 166-175. IEEE, (2013)