Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing the Placement of Data Collection Services on Vehicle Clusters., , , , and . PIMRC, page 1800-1806. IEEE, (2018)Potential of Augmented Reality for Intelligent Transportation Systems., , and . CoRR, (2018)Deriving policies from connection codes to ensure ongoing voltage stability., , , , , , and . Energy Inform., (2019)Evolving Intelligent Reflector Surface Toward 6G for Public Health: Application in Airborne Virus Detection., , , , , , , and . IEEE Netw., 35 (5): 306-312 (2021)An experimental testbed to predict the performance of XACML Policy Decision Points., , and . Integrated Network Management, page 353-360. IEEE, (2011)Comparative Analysis of Terahertz Propagation Under Dust Storm Conditions on Mars and Earth., , , , and . CoRR, (2023)Graph-based Heuristic Solution for Placing Distributed Video Processing Applications on Moving Vehicle Clusters., , and . CoRR, (2021)An Access Control Implementation Targeting Resource-constrained Environments., , and . CNSM, page 1-6. IEEE, (2019)Measurement and Prediction of Access Control Policy Evaluation Performance., and . IEEE Trans. Network and Service Management, 12 (4): 526-539 (2015)XACML policy performance evaluation using a flexible load testing framework., , and . ACM Conference on Computer and Communications Security, page 648-650. ACM, (2010)