Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Name-based push/pull message dissemination for disaster message board., , , , , , , and . LANMAN, page 1-6. IEEE, (2016)CoNAT: A network coding-based interest aggregation in content centric networks., , , and . ICC, page 5715-5720. IEEE, (2015)An Efficient Data Processing Scheme for Wireless Sensor Network Monitoring Using a Machine Learning Model., , and . ICMU, page 1-4. IEEE, (2018)Mean free path applied to message dissemination in opportunistic networks., , , and . INFOCOM Workshops, page 420-425. IEEE, (2015)Integration of Network and Artificial Intelligence toward the Beyond 5G/6G Networks., , , and . IEICE Trans. Commun., 106 (12): 1267-1274 (December 2023)Towards an incremental deployment of NDN: robust bootstrapping using in-network indirection., , and . ICN, page 171-173. ACM, (2022)Utilization of Content-Centric Networking for 60 GHz Spotty Networks., , and . ICN, page 223-224. ACM, (2016)A Scalable and Efficient Client Emulation Method for IP Multicast Performance Evaluation., , , and . AINA Workshops (1), page 142-147. IEEE Computer Society, (2007)Message from the CDS 2018 Workshop Organizers., , and . COMPSAC (2), page 240. IEEE Computer Society, (2018)978-1-5386-2667-2.An Anomaly Detection Approach by AIML in IP Networks with eBPF-Based Observability., , , and . APNOMS, page 171-176. IEEE, (2023)