Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting Mobile Agents Against Malicious Hosts., and . Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, page 44-60. Springer, (1998)An Artificial Chemistry for Networking., , and . BIOWIRE, volume 5151 of Lecture Notes in Computer Science, page 45-57. Springer, (2007)Online code compression in Wireless Sensor Networks., and . CTS, page 301-310. IEEE, (2011)Data Upload in Mobile Edge Computing over ICN., , , and . GLOBECOM Workshops, page 1-6. IEEE, (2019)On Hardware Programmable Network Dynamics With a Chemistry-Inspired Abstraction., , , and . IEEE/ACM Trans. Netw., 25 (4): 2054-2067 (2017)Protokollimplementierung mit Kommunikationsboten.. Kommunikation in Verteilten Systemen, page 475-489. Springer, (1995)A Self-Healing Multipath Routing Protocol., , and . BIONETICS, page 6. ICST / ACM, (2008)Solid over the Interplanetary File System., and . Networking, page 1-6. IEEE, (2021)A packet rewriting core for Information Centric Networking., , and . CCNC, page 67-72. IEEE, (2016)Secure Scuttlebutt: An Identity-Centric Protocol for Subjective and Decentralized Applications., , , and . ICN, page 1-11. ACM, (2019)