Author of the publication

The Sleepy Bird Catches More Worms: Revisiting Energy Efficient Neighbor Discovery.

, , and . IEEE Trans. Mob. Comput., 15 (7): 1812-1825 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smashing OpenFlow's ätomic" actions: Programmable data plane packet manipulation in hardware., , and . Int. J. Netw. Manag., (2019)BLC: Private Matrix Factorization Recommenders via Automatic Group Learning., , and . ACM Trans. Priv. Secur., 20 (2): 4:1-4:25 (2017)Deforming grid generation for numerical simulations of fluid dynamics in sliding vane rotary machines., , , and . Adv. Eng. Softw., (2017)Analytical grid generation and numerical assessment of tip leakage flows in sliding vane rotary machines., , , , and . Adv. Eng. Softw., (2021)"Cellular Network Densification Increases Radio-Frequency Pollution": True or False?, , , and . IEEE Trans. Wirel. Commun., 21 (4): 2608-2622 (2022)5G and Beyond for Contact Tracing., , , , and . IEEE Commun. Mag., 59 (9): 36-41 (2021)FlowFight: High performance-low memory top-k spreader detection., , , , and . Comput. Networks, (2021)A Survey on the Security of Stateful SDN Data Planes., , , , and . IEEE Commun. Surv. Tutorials, 19 (3): 1701-1725 (2017)Quantum Internet: Networking Challenges in Distributed Quantum Computing., , , , , and . IEEE Netw., 34 (1): 137-143 (2020)Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication., , , , , , , , , and 2 other author(s). IEEE Trans. Inf. Forensics Secur., (2020)