Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of throughput optimization and load sharing of multipath TCP in heterogeneous networks., , , and . WOCN, page 1-5. IEEE, (2011)Distributed Opportunistic and Diffused Coding in multi-hop wireless networks., , and . ICC, page 5583-5587. IEEE, (2012)Cooperative Mobility Management in Multihomed End-to-End Communications., , and . NTMS, page 1-5. IEEE, (2011)Performance-Cost Trade-Off Strategic Evaluation of Multipath TCP Communications., , , and . IEEE Trans. Network and Service Management, 11 (2): 250-263 (2014)Limitations of openflow topology discovery protocol., , , and . Med-Hoc-Net, page 1-3. IEEE, (2017)Analysis of Protocol Operations and Scalability of COPS-SLS Negotiation System., , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 1420-1425. Springer, (2004)Policy-based service level negotitation with COPS-SLS., and . Net-Con, volume 235 of IFIP Conference Proceedings, page 191-202. Kluwer, (2002)On the Way to a Theory for Network Architectures.. WCITD/NF, volume 327 of IFIP Advances in Information and Communication Technology, page 108-119. Springer, (2010)Towards a Blockgraph-Based Trustless Authentication Scheme for Future 6G Technology., , and . 6GNet, page 1-4. IEEE, (2023)A Cross-layer approach to optimize the performance of Concurrent Multipath Transfer in wireless transmission., , and . Wireless Days, page 1-5. IEEE, (2009)