Author of the publication

On the performance of network coding and forwarding schemes with different degrees of redundancy for wireless mesh networks.

, , , and . Comput. Commun., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security requirements and solutions for integrated satellite-terrestrial Information-Centric Networks., , , and . ASMS/SPSC, page 106-113. IEEE, (2014)Access point assignment algorithms in WLANs based on throughput objectives., and . WiOpt, page 375-383. IEEE, (2008)I-CAN: Information-centric future mobile and wireless access networks., , , , and . QSHINE, page 139-141. IEEE, (2014)Adapting Data Popularity in Mobility-Based Proactive Caching Decisions for Heterogeneous Wireless Networks., and . EAI Endorsed Trans. Cloud Syst., 2 (7): e3 (2016)Adapting data popularity in mobility-based proactive caching decisions for heterogeneous wireless networks., and . QSHINE, page 191-192. IEEE, (2014)Continuous authorization over HTTP using Verifiable Credentials and OAuth 2.0., , , , , , and . Open Identity Summit, volume P-325 of LNI, page 39-50. Gesellschaft für Informatik e.V., (2022)Resource control for hybrid code and time division scheduling.. PIMRC, page 1772-1776. IEEE, (2004)IoT Resource Access utilizing Blockchains and Trusted Execution Environments., , , , and . GIoTS, page 1-6. IEEE, (2019)Utility-based channel assignment and topology control in wireless mesh networks., , and . WOWMOM, page 1-9. IEEE Computer Society, (2010)Optimal CWmin selection for achieving proportional fairness in multi-rate 802.11e WLANs: test-bed implementation and evaluation., and . WiNTECH, page 41-48. ACM, (2006)