Author of the publication

An architecture for dynamic QoS management at Layer 2 for DOCSIS access networks using OpenFlow.

, , , , , , and . Comput. Networks, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Huarte, Maider
add a person with the name Huarte, Maider
 

Other publications of authors with the same name

A compatibility strategy for enabling secure and efficient ITS communications in today's Internet., , , , , and . Telecommun. Syst., 63 (2): 243-261 (2016)An Analysis of Improvements for Voter Interfaces in Polling Station and Remote Electronic Voting Systems., , , and . VISUAL, volume 5188 of Lecture Notes in Computer Science, page 291-301. Springer, (2008)Integrating complex legacy systems under OpenFlow control: The DOCSIS use case, , , , , and . Third European Workshop on Software Defined Networks, page 6. (2014)The MIH (Media Independent Handover) Contribution to Mobility Management in a Heterogeneous Railway Communication Context: A IEEE802.11/802.16 Case Study., , , and . Nets4Cars/Nets4Trains, volume 6596 of Lecture Notes in Computer Science, page 69-82. Springer, (2011)Evaluation of a Mobility Approach to Support Vehicular Applications Using a Realistic Simulation Framework., , , and . ICIST, volume 639 of Communications in Computer and Information Science, page 709-721. (2016)An architecture for dynamic QoS management at Layer 2 for DOCSIS access networks using OpenFlow., , , , , , and . Comput. Networks, (2016)Ladon1: end-to-end authorisation support for resource-deprived environments., , , and . IET Inf. Secur., 6 (2): 93-101 (2012)A proposal to contribute to ITS standardization activity: A valuable network mobility management approach., , , , , and . Comput. Stand. Interfaces, 36 (3): 465-479 (2014)A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities., , , , and . SECRYPT, page 395-402. SciTePress, (2013)Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors., , , , and . Sensors, 18 (2): 575 (2018)