Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated networking technologies for a survivable network military network applications., , , , , , , , , and 4 other author(s). WCNC, page 2424-2429. IEEE, (2005)Loosely coupled service composition for deployment of next generation service overlay networks., , , , , , and . IEEE Communications Magazine, 50 (1): 62-72 (2012)Services Composition Based on Next-Generation Service Overlay Networks Architecture., , , , , , , , and . NTMS, page 1-6. IEEE, (2011)Realizing Secure Cellular and Mobile Hot-Spot Extension to Tactical Networks., , , , , , , , , and . MILCOM, page 674-679. IEEE, (2013)Fast Design Space Exploration of Nonlinear Systems: Part I., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (9): 2970-2983 (2022)User-transparent reconfiguration method for self-organizing IP multimedia subsystem., , , , , , , and . ISCC, page 1137-1144. IEEE Computer Society, (2011)AIMED: AI-Mediated Exploration of Design: An Experience Report., , , , , , , , , and 5 other author(s). CPS-IoT Week Workshops, page 136-140. ACM, (2023)Talking After Lights Out: An Ad Hoc Network for Electric Grid Recovery., , , , and . SmartGridComm, page 181-187. IEEE, (2021)Automatic over-the-air provisioning for Wi-Fi equipped M2M devices., , , , and . LCN, page 675-678. IEEE Computer Society, (2013)ACtive edge-Tagging (ACT): An Intruder Identification & Isolation Scheme in Active Networks., , and . ISCC, page 29-34. IEEE Computer Society, (2001)