Author of the publication

Design and Development of Essential Use-Cases for Self-management in Future Internet Wireless Networks.

, , , , , , , , , , , , , , , , , and . MOBILIGHT, volume 45 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 318-333. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

e-Health Services in the Context of IoT: The Case of the VICINITY Project., , , , , , , and . AIAI (Workshops), volume 520 of IFIP Advances in Information and Communication Technology, page 62-69. Springer, (2018)Developing an Innovative Multi-hop Relay Station Software Architecture in the Scope of the REWIND European Research Programme., , , , , , , and . MOBILIGHT, volume 13 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 160-172. Springer, (2009)Modern Video-to-Video Communications to Enhance Citizens' Quality of Life and Create Opportunities for Growth in "Smart" European Cities., , , , , , , and . AIAI Workshops, volume 437 of IFIP Advances in Information and Communication Technology, page 1-12. Springer, (2014)A 5G-Based Architecture for Localization Accuracy., , , and . AIAI Workshops, volume 652 of IFIP Advances in Information and Communication Technology, page 23-33. Springer, (2022)Security and Protection of Critical Infrastructures: A Conceptual and Regulatory Overview for Network and Information Security in the European Framework, also focusing upon the Cloud Perspective., , , , , , , and . EANN Workshops, page 28:1-28:10. ACM, (2015)The Challenge of Security Breaches in the Era of 5G Networking., , , and . AIAI Workshops, volume 628 of IFIP Advances in Information and Communication Technology, page 106-117. Springer, (2021)Inclusion of Telemetry and Data Analytics in the Context of the 5G ESSENCE Architectural Approach., , , , , , , , , and . AIAI (Workshops), volume 560 of IFIP Advances in Information and Communication Technology, page 46-59. Springer, (2019)Putting Intelligence in the Network Edge Through NFV and Cloud Computing: The SESAME Approach., , , , , , , , , and . EANN, volume 744 of Communications in Computer and Information Science, page 704-715. Springer, (2017)Network Architecture and Essential Features for 5G: The SESAME Project Approach., , , , , , , , , and 3 other author(s). AIAI, volume 475 of IFIP Advances in Information and Communication Technology, page 676-685. Springer, (2016)Security Analysis of Mobile Edge Computing in Virtualized Small Cell Networks., , , , , , , , and . AIAI, volume 475 of IFIP Advances in Information and Communication Technology, page 653-665. Springer, (2016)