Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Heuristics for Network Coding in Wireless Networks, , and . CoRR, (2007)Green Mining: toward a less energetic impact of cryptocurrencies., and . IACR Cryptology ePrint Archive, (2018)Space-time information propagation in mobile ad hoc wireless networks.. ITW, page 260-264. IEEE, (2004)SecLoc: Encryption system based on compressive sensing measurements for location estimation., and . INFOCOM Workshops, page 171-172. IEEE, (2014)Analysis of digital tries with Markovian dependency., and . IEEE Trans. Inf. Theory, 37 (5): 1470-1475 (1991)Analysis of a stack algorithm for CSMA-CD random length packet communication., and . IEEE Trans. Inf. Theory, 36 (2): 420-426 (1990)Ultimate Characterizations of the Burst Response of an Interval Searching Algorithm: A Study of a Functional Equation., and . SIAM J. Comput., 18 (4): 777-791 (1989)OLSR performance measurement in a military mobile ad hoc network., , , , , , , , and . Ad Hoc Networks, 3 (5): 575-588 (2005)What Can We Learn about Suffix Trees from Independent Tries?, and . WADS, volume 519 of Lecture Notes in Computer Science, page 228-239. Springer, (1991)Adaptive Multiplicity Codes based PIR Protocol for Multi-Cloud Plateform Services., , and . 5G World Forum, page 99-105. IEEE, (2018)