Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring Power Relations Among Locations From Mobility Data., , and . MobiWac, page 41-48. ACM, (2019)Urban Computing Leveraging Location-Based Social Network Data: A Survey., , , , , , and . ACM Comput. Surv., 52 (1): 17:1-17:39 (2019)Gossiping on MANETs: the beauty and the beast., , , , and . ACM SIGOPS Oper. Syst. Rev., 41 (5): 67-74 (2007)On the regularity of human mobility, , , , and . Pervasive and Mobile Computing, (2016)Exists several times with different authors (cf. https://hal.inria.fr/hal-01367825). This is the Elsevier version: http://www.sciencedirect.com/science/article/pii/S1574119216300281.Activity pattern impact of primary radio nodes on channel selection strategies., , , and . CogART, page 36. ACM, (2011)Introducing benchmarks for evaluating user-privacy vulnerability in WiFi., , and . VTC2023-Spring, page 1-7. IEEE, (2023)Extração e Análise de Dados Como Suporte a Estratégias de Comunicação D2D Cientes do Humano., , , and . SBRC, page 449-462. (2020)LSTM-based generation of cellular network traffic., , and . WCNC, page 1-6. IEEE, (2023)Simulating SIMBox frauds for detection investigation., , and . StudentWorkshop@CoNEXT, page 12-14. ACM, (2022)Traffic aware video dissemination over vehicular ad hoc networks., , , , , , and . MSWiM, page 419-426. ACM, (2013)