Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile Hotspots., , and . AINTEC, volume 4866 of Lecture Notes in Computer Science, page 60-69. Springer, (2007)Seamless Resource Sharing in Wearable Networks by Application Function Virtualization., , , , and . IEEE Trans. Mob. Comput., 18 (6): 1393-1406 (2019)Efficient location management for hybrid wireless ATM networks: architecture and performance analysis., , and . WCNC, page 378-382. IEEE, (1999)Mobile social networking through friend-to-friend opportunistic content dissemination., , , and . MobiHoc, page 263-266. ACM, (2013)Supercharging Crowd Dynamics Estimation in Disasters via Spatio-Temporal Deep Neural Network., , , , , , and . DSAA, page 184-192. IEEE, (2017)Tailoring Protocols for Dynamic Network Conditions and User Requirements., and . IDMS, volume 1718 of Lecture Notes in Computer Science, page 177-190. Springer, (1999)Enhancing TCP energy efficiency for mobile hosts., and . ICON, page 235-239. IEEE, (2002)A First Look into Privacy Leakage in 3D Mixed Reality Data., , and . ESORICS (1), volume 11735 of Lecture Notes in Computer Science, page 149-169. Springer, (2019)uStash: a Novel Mobile Content Delivery System for Improving User QoE in Public Transport., , , , and . CoRR, (2017)Utility Optimization for Blockchain Empowered Edge Computing with Deep Reinforcement Learning., , , , , and . ICC, page 1-6. IEEE, (2021)