Fuzzy Logic for Cross-layer Optimization in Cognitive Radio Networks
, in Proceedings of 4th IEEE Consumer Communications and Networking Conference, 11-13 January 2007, Las Vegas (USA)
Buffer Control Strategies for the Transmission of TCP Flows over Geostationary Satellite Links Using Proxy-Based Architectures
, in Proceedings of IEEE VTC-Spring 2005, May 30 - June 1, Stockholm (Sweden)
Learning and Adaptation in Cognitive Radios using Neural Networks
, in Proceedings of 5th IEEE Consumer Communications and Networking Conference, January 2008, Las Vegas (USA).
3G/4G Mobile Network Planning Aspects: IMS-capable Core Network Dimensioning and Radio Access Network Topological Design for Enabling NGN Services
, VDM Verlag publishing house, October, 2008, ISBN 978-3-639-09011-6
A New Approach to Simulating PHY, MAC and Routing
, in Proceedings on the International Workshop on NS-2 (WNS2), in conjunction with VALUETOOLS 2008, 23 October 2008, Athens (Greece).
Improved Resource Management through User Aggregation in Heterogeneous Multiple Access Wireless Networks
, Published in IEEE Transactions on Wireless Communications, Vol. 7, No. 9, pp. 3329-3334 September 2008.
A Note About the Traceability Properties of Linear Codes
, Information Security and Cryptology - ICISC 2007. Lecture Notes in Computer Science, 2007, vol 4817, pp. 251-258. ISBN 978-3-540-76787-9
Shared self-organized GKM protocol for MANETs
, Journal of Information Science and Engineering, Vol. 24, No. 6, pp. 1629-1646, 2008.
Secure Remote Voter Registration
, in Proceedings of 3rd International Symposium on Electronic Voting (EVOTE 2008), 7-9 August 2008, Bregenz (Austria).
New Considerations about the correct design of Turbo Fingerprinting Codes
, "Published in Lecture Notes in Computer Science, Vol. 5283/2008 ISSN: 0302-9743, ISBN: 978-3-540-88312-8, pp. 501-516. Editor Springer Berlin / Heidelberg. September 2008.