Author of the publication

An Information Notification Model with VPC on KODAMA in an Ubiquitous Computing Environment, and Its Experiment.

, , , , , , and . CIA, volume 2782 of Lecture Notes in Computer Science, page 30-45. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When should we surf the mobile web using both wifi and cellular?, , and . ATC@MobiCom, page 7-12. ACM, (2016)Understanding the impact of network dynamics on mobile video user engagement., , , , , and . SIGMETRICS, page 367-379. ACM, (2014)Channel Access Throttling for Improving WLAN QoS., , , , and . SECON, page 1-9. IEEE, (2009)Maranello: Practical Partial Packet Recovery for 802.11., , , , , , , , and . NSDI, page 205-218. USENIX Association, (2010)An anatomy of mobile web performance over multipath TCP., , , and . CoNEXT, page 5:1-5:7. ACM, (2015)TowerDefense: Deployment strategies for battling against IP prefix hijacking., , , , and . ICNP, page 134-143. IEEE Computer Society, (2010)Wireless Wallet., , , , and . MobiQuitous, page 32-41. IEEE Computer Society, (2004)Channel Access Throttling for Overlapping BSS Management., , , , and . ICC, page 1-6. IEEE, (2009)An Information Notification Model with VPC on KODAMA in an Ubiquitous Computing Environment, and Its Experiment., , , , , , and . CIA, volume 2782 of Lecture Notes in Computer Science, page 30-45. Springer, (2003)Locating Prefix Hijackers using LOCK., , , , , and . USENIX Security Symposium, page 135-150. USENIX Association, (2009)