Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes., and . ICC, page 1385-1390. IEEE, (2007)Linear-Complexity Models for Wireless MAC-to-MAC Channels., and . Wireless Networks, 11 (5): 543-555 (2005)Performance analysis and modeling of errors and losses over 802.11b LANs for high-bit-rate real-time multimedia., , , and . Signal Process. Image Commun., 18 (7): 575-595 (2003)A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks., and . ICDCS Workshops, page 210-216. IEEE Computer Society, (2005)Markov-based modeling of wireless local area networks., and . MSWiM, page 100-107. ACM, (2003)On the Impact of Ignoring Markovian Channel Memory on the Analysis of Wireless Systems., and . ICC, page 199-204. IEEE, (2007)Improving Wireless Multimedia Quality using Header Detection with Priors., , , and . ICC, page 5457-5462. IEEE, (2006)Analyzing the spread of active worms over VANET., and . Vehicular Ad Hoc Networks, page 86-87. ACM, (2004)A statistical receiver-based approach for improved throughput of multimedia communications over wireless LANs., , , , and . ICC, page 3589-3593. IEEE, (2005)On Channel State Inference and Prediction Using Observable Variables in 802.11b Network., , , , , , and . ICC, page 4554-4559. IEEE, (2007)