Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ES2: Managing link level parameters for elevating data rate and stability in High Throughput WLAN., and . COMSNETS, page 1-8. IEEE, (2016)Amalgam: Distributed Network Control With Scalable Service Chaining., , , and . Networking, page 519-523. IEEE, (2020)Improving MPTCP Performance by Enabling Sub-Flow Selection over a SDN Supported Network., , , and . WiMob, page 1-8. IEEE, (2018)A Trigger Counting Mechanism for Ring Topology., and . ACSC, volume 147 of CRPIT, page 81-87. Australian Computer Society, (2014)A Time Aware Method for Predicting Dull Nodes and Links in Evolving Networks for Data Cleaning., , , and . WI, page 304-310. IEEE Computer Society, (2016)Fast and Secure Handoffs for V2I Communication in Smart City Wi-Fi Deployment., , , and . ICDCIT, volume 10722 of Lecture Notes in Computer Science, page 189-204. Springer, (2018)FLIPPER: Fault-tolerant distributed network management and control., , , and . IM, page 421-427. IEEE, (2017)Surpassing flow fairness in a mesh network: How to ensure equity among end users?, , and . IEEE ANTS, page 1-6. IEEE, (2013)Containerized deployment of micro-services in fog devices: a reinforcement learning-based approach., , , , , and . J. Supercomput., 78 (5): 6817-6845 (2022)Defending concealedness in IEEE 802.11n., , , and . COMSNETS, page 1-8. IEEE, (2014)