Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peer selection and scheduling of H.264 SVC video over wireless networks., , , and . WCNC, page 1633-1638. IEEE, (2013)Dynamic trust establishment in emergency ad hoc networks., , , and . IWCMC, page 26-30. ACM, (2009)Cloud for multimedia applications and services over heterogeneous networks ensuring QoE., , , , and . CAMAD, page 94-98. IEEE, (2013)Simulating mission critical mobile ad hoc networks., , , and . PM2HW2N@MSWiM, page 143-150. ACM, (2009)Enhanced failover mechanisms for tree-based peer-to-peer streaming., , , , and . ICC, page 7024-7029. IEEE, (2015)User and network level evaluation of VoIP over emergency ad-hoc networks., , , and . MobiMedia, ICST, (2009)An obstacle-aware human mobility model for ad hoc networks., , , and . MASCOTS, page 1-9. IEEE Computer Society, (2009)Modeling human mobility in obstacle-constrained ad hoc networks., , , and . Ad Hoc Networks, 10 (3): 421-434 (2012)Malicious threats and novel security extensions in P2PSIP., , , , and . PerCom Workshops, page 746-751. IEEE Computer Society, (2012)Software-Defined Networking for Ubiquitous Healthcare Service Delivery., , , and . BROADNETS, volume 263 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 95-104. Springer, (2018)