Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile Hotspots., , and . AINTEC, volume 4866 of Lecture Notes in Computer Science, page 60-69. Springer, (2007)Seamless Resource Sharing in Wearable Networks by Application Function Virtualization., , , , and . IEEE Trans. Mob. Comput., 18 (6): 1393-1406 (2019)A First Look into Privacy Leakage in 3D Mixed Reality Data., , and . ESORICS (1), volume 11735 of Lecture Notes in Computer Science, page 149-169. Springer, (2019)Blockchain and AI-based Solutions to Combat Coronavirus (COVID-19)-like Epidemics: A Survey., , , and . CoRR, (2021)The Use of Smart Contracts and Challenges., , , , , , and . CoRR, (2018)Tailoring Protocols for Dynamic Network Conditions and User Requirements., and . IDMS, volume 1718 of Lecture Notes in Computer Science, page 177-190. Springer, (1999)uStash: a Novel Mobile Content Delivery System for Improving User QoE in Public Transport., , , , and . CoRR, (2017)Enhancing TCP energy efficiency for mobile hosts., and . ICON, page 235-239. IEEE, (2002)Network Traffic Classification Using WiFi Sensing., , and . MASCOTS (Revised Selected Papers), volume 12527 of Lecture Notes in Computer Science, page 48-61. Springer, (2020)Melhorando a Acurácia da Detecção de Lavagem de Dinheiro na Rede Bitcoin., , , , , and . SBRC, page 728-741. (2020)