Author of the publication

On the Performance of Network Coding and Forwarding Schemes with Different Degrees of Redundancy for Wireless Mesh Networks.

, , , and . CoRR, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource control for hybrid code and time division scheduling.. PIMRC, page 1772-1776. IEEE, (2004)IoT Group Membership Management Using Decentralized Identifiers and Verifiable Credentials., , , and . Future Internet, 14 (6): 173 (2022)IoT Resource Access utilizing Blockchains and Trusted Execution Environments., , , , and . GIoTS, page 1-6. IEEE, (2019)Continuous authorization over HTTP using Verifiable Credentials and OAuth 2.0., , , , , , and . Open Identity Summit, volume P-325 of LNI, page 39-50. Gesellschaft für Informatik e.V., (2022)Pushing for higher rates and efficiency in Satcom: the different perspectives within SatNExIV., , , , , , , , , and . CoRR, (2018)Adapting data popularity in mobility-based proactive caching decisions for heterogeneous wireless networks., and . QSHINE, page 191-192. IEEE, (2014)Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection., , , and . Wirel. Commun. Mob. Comput., 15 (2): 276-294 (2015)Enhancing mobile data offloading with mobility prediction and prefetching., and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 17 (1): 22-29 (2013)Wireless Systems Cell dimensioning in the CDMA uplink based on economic modelling.. Eur. Trans. Telecommun., 18 (4): 427-433 (2007)Access point assignment algorithms in WLANs based on throughput objectives., and . WiOpt, page 375-383. IEEE, (2008)