Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Review and Designs of Federated Management in Future Internet Architectures., , , , and . Future Internet Assembly, volume 6656 of Lecture Notes in Computer Science, page 51-66. Springer, (2011)Semantic web technologies to aid dominance detection for access control policies., and . IM, page 780-783. IEEE, (2013)Policy-based architecture to enable autonomic communications - a position paper., , , , , and . CCNC, page 590-594. IEEE, (2006)Policy-assisted planning and deployment of virtual networks., , , , and . CNSM, page 1-8. IEEE, (2011)Complexity-Driven CNN Compression for Resource-constrained Edge AI., , and . CoRR, (2022)A Causal Convolutional Approach for Packet Loss Concealment in Low Powered Devices., , , , , and . ICASSP, page 1-5. IEEE, (2023)On harnessing information models and ontologies for policy conflict analysis., , and . Integrated Network Management, page 821-826. IEEE, (2009)Towards In-Network Clouds in Future Internet, , , , , , , and . The Future Internet, volume 6656 of Lecture Notes in Computer Science, (2011)Server placement and assignment in virtualized radio access networks., , , , and . CNSM, page 398-401. IEEE Computer Society, (2015)Conflict Prevention Via Model-Driven Policy Refinement., , and . DSOM, volume 4269 of Lecture Notes in Computer Science, page 209-220. Springer, (2006)