Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peer selection and scheduling of H.264 SVC video over wireless networks., , , and . WCNC, page 1633-1638. IEEE, (2013)Enhanced failover mechanisms for tree-based peer-to-peer streaming., , , , and . ICC, page 7024-7029. IEEE, (2015)Simulating mission critical mobile ad hoc networks., , , and . PM2HW2N@MSWiM, page 143-150. ACM, (2009)Dynamic trust establishment in emergency ad hoc networks., , , and . IWCMC, page 26-30. ACM, (2009)Cloud for multimedia applications and services over heterogeneous networks ensuring QoE., , , , and . CAMAD, page 94-98. IEEE, (2013)Modeling human mobility in obstacle-constrained ad hoc networks., , , and . Ad Hoc Networks, 10 (3): 421-434 (2012)User and network level evaluation of VoIP over emergency ad-hoc networks., , , and . MobiMedia, ICST, (2009)An obstacle-aware human mobility model for ad hoc networks., , , and . MASCOTS, page 1-9. IEEE Computer Society, (2009)Malicious threats and novel security extensions in P2PSIP., , , , and . PerCom Workshops, page 746-751. IEEE Computer Society, (2012)A study on cooperative SVC Video streaming over hybrid residential and wireless networks., , , and . CAMAD, page 364-367. IEEE, (2012)