Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trace-based simulation for 6TiSCH., , and . Internet Technol. Lett., (2020)Enhancing the performance of RPL using a Receiver-Based MAC protocol in lossy WSNs., , and . ICT, page 191-194. IEEE, (2011)Performance of the Transport Layer Security Handshake Over 6TiSCH., , , , and . Sensors, 21 (6): 2192 (2021)Industrial IEEE802.15.4e networks: Performance and trade-offs., , , and . ICC, page 604-609. IEEE, (2015)Lessons learned from large-scale dense IEEE802.15.4 connectivity traces., , and . CASE, page 145-150. IEEE, (2015)Atlas: Exploration and Mapping with a Sparse Swarm of Networked IoT Robots., , , , , and . DCOSS, page 338-342. IEEE, (2020)Using virtual coordinates for wireless sensor networks: Proof-of-concept experimentation., , , and . TRIDENTCOM, page 1-8. IEEE Computer Society, (2009)Performance Comparison of EDHOC and DTLS 1.3 in Internet-of-Things Environments., , and . WCNC, page 1-6. IEEE, (2024)Using Existing Network Simulators for Power-Aware Self-Organizing Wireless Sensor Network Protocols. CoRR, (2006)Protocol-Agnostic Compression for Resource-Constrained Wireless Networks., , , and . GLOBECOM, page 1-5. IEEE, (2010)