Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Privacy-Preserving Network Monitoring: Issues and Challenges., , , , , , , , and . PIMRC, page 1-5. IEEE, (2007)The Sleepy Bird Catches More Worms: Revisiting Energy Efficient Neighbor Discovery., , and . IEEE Trans. Mob. Comput., 15 (7): 1812-1825 (2016)QoS support and service differentiation in wireless networks., , , , , , and . Int. J. Commun. Syst., 17 (6): 507-512 (2004)BLC: Private Matrix Factorization Recommenders via Automatic Group Learning., , and . ACM Trans. Priv. Secur., 20 (2): 4:1-4:25 (2017)Smashing OpenFlow's ätomic" actions: Programmable data plane packet manipulation in hardware., , and . Int. J. Netw. Manag., (2019)"Cellular Network Densification Increases Radio-Frequency Pollution": True or False?, , , and . IEEE Trans. Wirel. Commun., 21 (4): 2608-2622 (2022)5G and Beyond for Contact Tracing., , , , and . IEEE Commun. Mag., 59 (9): 36-41 (2021)FlowFight: High performance-low memory top-k spreader detection., , , , and . Comput. Networks, (2021)Deforming grid generation for numerical simulations of fluid dynamics in sliding vane rotary machines., , , and . Adv. Eng. Softw., (2017)Analytical grid generation and numerical assessment of tip leakage flows in sliding vane rotary machines., , , , and . Adv. Eng. Softw., (2021)