Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Network-Layer Security on IPv6 Wireless Sensor Networks., , and . GLOBECOM, page 1-6. IEEE, (2010)An Adaptable Framework for Interoperating Between Wireless Sensor Networks and External Applications., , , and . SENSORNETS, page 95-102. SciTePress, (2014)Designing the simulative evaluation of an architecture for supporting QoS on a large scale., , , , , , , , and . SimuTools, page 6. ICST/ACM, (2008)EuQoS approach for resource allocation in Ethernet networks., , and . Int. J. Netw. Manag., 17 (5): 373-388 (2007)Automatically Assessing Students Performance with Smartphone Data., , , , and . CoRR, (2022)Industrial IoT Monitoring: Technologies and Architecture Proposal., , , , and . Sensors, 18 (10): 3568 (2018)The use of COPS and NSIS in the EuQoS Project., , , , , , , , and . Net-Con, volume 229 of IFIP, page 159-171. Springer, (2005)Tech4SocialChange: Crowd-sourcing to bring migrants' experiences to the academics: Humanitarian challenges and opportunities, connectivity & communication., , , , , , , , , and 3 other author(s). GHTC, page 316-321. IEEE, (2016)User-centric privacy preserving models for a new era of the Internet of Things., , , , and . J. Netw. Comput. Appl., (2023)On the feasibility of secure application-layer communications on the Web of Things., , and . LCN, page 228-231. IEEE Computer Society, (2012)