Author of the publication

Application of Information Centric Networking to NoSQL databases: The spatio-temporal use case.

, , , , , , and . LANMAN, page 1-6. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The One-Out-of-k Retrieval Problem and Linear Network Coding., , , , and . ICMCTA, volume 3 of CIM Series in Mathematical Sciences, page 61-75. Springer, (2014)Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications., , and . Future Internet, 10 (2): 13 (2018)The case for native multi-node in-network machine learning., , , , , and . NativeNI@CoNEXT, page 8-13. ACM, (2022)A Theory-Driven Distribution Algorithm for Peer-to-Peer Real Time Streaming., , , , , and . GLOBECOM, page 2291-2296. IEEE, (2008)eBPF Programming Made Easy with eCLAT., , , , , and . CNSM, page 28-36. IEEE, (2022)Application of Information Centric Networking to NoSQL databases: The spatio-temporal use case., , , , , , and . LANMAN, page 1-6. IEEE, (2017)Performance Assessment of an Epidemic Protocol in VANET Using Real Traces., , , , , and . MoWNet, volume 40 of Procedia Computer Science, page 92-99. Elsevier, (2014)Simulation of peer-to-peer streaming over large-scale networks using OPSS., , , and . VALUETOOLS, page 17. ICST/ACM, (2007)The Design of an Energy Harvesting Wireless Sensor Node for Tracking Pink Iguanas., , , , , and . Sensors, 19 (5): 985 (2019)ABEBox: A data driven access control for securing public cloud storage with efficient key revocation., , , and . ARES, page 129:1-129:7. ACM, (2021)