Author of the publication

Factoring IPv6 Device Mobility and Ad-hoc Interactions into the Service Location Protocol.

, and . LCN, page 387-394. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-layer modeling of wireless channels for data-link and IP layer performance evaluation., , and . Comput. Commun., 29 (7): 827-841 (2006)The PFTK-model revised., , and . Comput. Commun., 29 (13-14): 2671-2679 (2006)Proactive Handover Scheme Based on Forwarding Router Discovery for Mobile IP Networks., , , and . IEICE Trans. Commun., 88-B (7): 2718-2725 (2005)Computing the Critical Time for a Cellular Network Simulation on a Cluster of Workstations., , and . ESM, page 61-68. SCS Europe, (1998)A novel two-step MPEG traffic modeling algorithm based on a GBAR process., , and . Net-Con, volume 235 of IFIP Conference Proceedings, page 293-304. Kluwer, (2002)Measurements based Analysis of the Fairness of TCP and UDP Flows in a Differentiated Services Capable Network., , and . IMSA, page 114. IASTED/ACTA Press, (2001)Simulation Support for the OTSO Environment., , and . INDC, volume C-6 of IFIP Transactions, page 203-211. North-Holland, (1992)Performance estimation of UMTS release 5 IM-subsystem elements., , , and . MWCN, page 35-39. IEEE, (2002)The Time Will Tell on You: Exploring Information Leaks in SSH Public Key Authentication., and . NSS, volume 10394 of Lecture Notes in Computer Science, page 301-314. Springer, (2017)Service Discovery Framework for MANETs Using Cross-Layered Design., , and . WWIC, volume 5031 of Lecture Notes in Computer Science, page 152-163. Springer, (2008)