Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Autonomous driving in 5G: Mitigating interference in OFDM-based vehicular communications., , , and . CAMAD, page 1-6. IEEE, (2017)A Survey on Software Tools and Architectures for Deploying Multimedia-Aware Cloud Applications., and . ALGOCLOUD, volume 9511 of Lecture Notes in Computer Science, page 168-180. Springer, (2015)Radio resource management: approaches and implementations from 4G to 5G and beyond., , and . Wirel. Networks, 27 (1): 693-734 (2021)Secure Network Coding for SDN-Based Mobile Small Cells., , , and . BROADNETS, volume 263 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 347-356. Springer, (2018)A model of network related QoE for 3D video., , , , , and . GLOBECOM Workshops, page 1335-1340. IEEE, (2012)On optimizing scalable video delivery over media aware mobile clouds., , , and . ICC, page 1-6. IEEE, (2017)Malicious user identification scheme for network coding enabled small cell environment., , , , and . ICC, page 1-6. IEEE, (2020)On the Deployment of Healthcare Applications over Fog Computing Infrastructure., , , and . COMPSAC (2), page 288-293. IEEE Computer Society, (2017)978-1-5386-0367-3.Malicious threats and novel security extensions in P2PSIP., , , , and . PerCom Workshops, page 746-751. IEEE Computer Society, (2012)On quality evaluation of 3D video using Colour-plus-Depth and MDC., , , , and . CAMAD, page 66-69. IEEE, (2014)