The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jean-Pierre Hubaux: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xavier Garcia Adanez, Olivier Verscheure, Jean-Pierre Hubaux
    New Network and ATM Adaptation Layers for Real-Time Multimedia Applications: A Performance Study Based on Psychophysics. [Citation Graph (0, 0)][DBLP]
    COST 237 Workshop, 1996, pp:216-231 [Conf]
  2. Olivier Verscheure, Jean-Pierre Hubaux
    Perceptual Video Quality and Activity Metrics: Optimization of Video Services Based on MPEG-2 Encoding. [Citation Graph (0, 0)][DBLP]
    COST 237 Workshop, 1996, pp:249-265 [Conf]
  3. Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun
    A Formal Analysis of Syverson?s Rational Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:193-205 [Conf]
  4. Jun Luo, Jacques Panchard, Michal Piórkowski, Matthias Grossglauser, Jean-Pierre Hubaux
    MobiRoute: Routing Towards a Mobile Sink for Improving Lifetime in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DCOSS, 2006, pp:480-497 [Conf]
  5. Jean-Philippe Martin-Flatin, Laurent Bovet, Jean-Pierre Hubaux
    JAMAP: A Web-based Management Platform for IP Networks. [Citation Graph (0, 0)][DBLP]
    DSOM, 1999, pp:164-178 [Conf]
  6. Simon Znaty, Jean-Pierre Hubaux
    Workshop 1: Object-Oriented Technology for Telecommunications Services Engineering (Introduction). [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1997, pp:1-2 [Conf]
  7. Simon Znaty, Jean-Pierre Hubaux
    Telecommunications Services Engineering: Principles, Architectures and Tools. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1997, pp:3-11 [Conf]
  8. Jean-Pierre Hubaux
    New Research Challenges for the Security of Ad Hoc and Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:1- [Conf]
  9. Jean-Pierre Hubaux
    Security and Cooperation in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:1-2 [Conf]
  10. Markus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán
    A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:15-33 [Conf]
  11. Juan-José Martins, Jean-Pierre Hubaux
    A New System Engineering Methodology Coupling Formal Specification and Performance Evaluation. [Citation Graph (0, 0)][DBLP]
    FME, 1996, pp:140-159 [Conf]
  12. Srdjan Capkun, Maher Hamdi, Jean-Pierre Hubaux
    GPS-Free Positioning in Mobile ad-hoc Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2001, pp:- [Conf]
  13. Márk Félegyházi, Mario Cagalj, Jean-Pierre Hubaux
    Multi-radio channel allocation in competitive wireless networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2006, pp:36- [Conf]
  14. Silvia Giordano, Maher Hamdi, Jean-Pierre Hubaux, Jean-Yves Le Boudec, Ljubica Blazevic
    Issues of Mobile Ad-Hoc WANs. [Citation Graph (0, 0)][DBLP]
    IEEE International Conference on Multimedia and Expo (III), 2000, pp:1261-1264 [Conf]
  15. Raffaele Noro, Jean-Pierre Hubaux
    Improving Clock Synchronization for MPEG-2 Services over ATMM Networks. [Citation Graph (0, 0)][DBLP]
    IDMS, 1997, pp:176-188 [Conf]
  16. Márk Félegyházi, Levente Buttyán, Jean-Pierre Hubaux
    Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:776-789 [Conf]
  17. Tuncay Saydam, Jean-Paul Gaspoz, P.-A. Etique, Jean-Pierre Hubaux
    Object-oriented design of a VPN bandwidth management system. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 1995, pp:344-355 [Conf]
  18. Mario Cagalj, Saurabh Ganeriwal, Imad Aad, Jean-Pierre Hubaux
    On selfish behavior in CSMA/CA networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:2513-2524 [Conf]
  19. Srdjan Capkun, Jean-Pierre Hubaux
    Secure positioning of wireless devices with application to sensor networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:1917-1928 [Conf]
  20. Jun Luo, Patrick Th. Eugster, Jean-Pierre Hubaux
    Route Driven Gossip: Probabilistic Reliable Multicast in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  21. Jun Luo, Jean-Pierre Hubaux
    Joint mobility and routing for lifetime elongation in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:1735-1746 [Conf]
  22. Yu-Hong Pusztaszeri, Maurice Alou, Ernst Biersack, Philippe Dubois, Jean-Paul Gaspoz, Pascal Gros, Jean-Pierre Hubaux
    Multimedia Teletutoring over a Trans-European ATM Network. [Citation Graph (0, 0)][DBLP]
    IWACA, 1994, pp:315-327 [Conf]
  23. Simon Znaty, Thomas Walter, Marcus Brunner, Jean-Pierre Hubaux, Bernhard Plattner
    Multimedia Multipoint Teleteaching over the European ATM Pilot. [Citation Graph (0, 0)][DBLP]
    International Zurich Seminar on Digital Communications, 1996, pp:225-238 [Conf]
  24. Juan-José Martins, Jean-Pierre Hubaux
    Evaluating Performance from Formal Specification. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1996, pp:285-290 [Conf]
  25. Constant Gbaguidi, Olivier Verscheure, Jean-Pierre Hubaux
    A new flexible and modular QoS mapping framework based on psychophysics. [Citation Graph (0, 0)][DBLP]
    MMNS, 1997, pp:67-80 [Conf]
  26. Xavier Logean, Jean-Pierre Hubaux, Simon Znaty
    A Generic Component Model for the design of future. [Citation Graph (0, 0)][DBLP]
    MMNS, 1997, pp:3-16 [Conf]
  27. Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
    Denial of service resilience in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2004, pp:202-215 [Conf]
  28. Mario Zagalj, Jean-Pierre Hubaux, Christian C. Enz
    Minimum-energy broadcast in all-wireless networks: : NP-completeness and distribution issues. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2002, pp:172-182 [Conf]
  29. Levente Buttyán, Jean-Pierre Hubaux
    Enforcing service availability in mobile ad-hoc WANs. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2000, pp:87-96 [Conf]
  30. Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán
    Mobility helps security in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2003, pp:46-56 [Conf]
  31. Jun Luo, Jean-Pierre Hubaux, Patrick Th. Eugster
    PAN: providing reliable storage in mobile ad hoc networks with probabilistic quorum systems. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2003, pp:1-12 [Conf]
  32. Jean-Pierre Hubaux, Levente Buttyán, Srdjan Capkun
    The quest for security in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2001, pp:146-155 [Conf]
  33. Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson
    A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2003, pp:13-24 [Conf]
  34. Maxim Raya, Jean-Pierre Hubaux, Imad Aad
    DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2004, pp:- [Conf]
  35. Jean-Pierre Hubaux
    Rational behaviors in hotspots and in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    MSWiM, 2004, pp:115-116 [Conf]
  36. Márk Félegyházi, Jean-Pierre Hubaux, Levente Buttyán
    Cooperative Packet Forwarding in Multi-Domain Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2005, pp:345-349 [Conf]
  37. Raffaele Noro, Maher Hamdi, Jean-Pierre Hubaux
    Circuit Emulation Over IP Networks. [Citation Graph (0, 0)][DBLP]
    Protocols for High-Speed Networks, 1999, pp:187-202 [Conf]
  38. Falk Dietrich, Xavier Logean, Shawn Koppenhoefer, Jean-Pierre Hubaux
    Testing Temporal Logic Properties in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IWTCS, 1998, pp:247-258 [Conf]
  39. Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux
    SECTOR: secure tracking of node encounters in multi-hop wireless networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:21-32 [Conf]
  40. Maxim Raya, Jean-Pierre Hubaux
    The security of vehicular ad hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:11-21 [Conf]
  41. Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Mani B. Srivastava
    Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:280-294 [Conf]
  42. Levente Buttyán, Jean-Pierre Hubaux
    Accountable Anonymous Access to Services in Mobile Communication Systems. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1999, pp:384-389 [Conf]
  43. Levente Buttyán, Jean-Pierre Hubaux
    Rational Exchange - A Formal Model Based on Game Theory. [Citation Graph (0, 0)][DBLP]
    WELCOM, 2001, pp:114-126 [Conf]
  44. Márk Félegyházi, Srdjan Capkun, Jean-Pierre Hubaux
    SOWER: self-organizing wireless network for messaging. [Citation Graph (0, 0)][DBLP]
    WMASH, 2004, pp:1-10 [Conf]
  45. Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakobsson
    Reputation-based Wi-Fi deployment protocols and security analysis. [Citation Graph (0, 0)][DBLP]
    WMASH, 2004, pp:29-40 [Conf]
  46. Srdjan Capkun, Jean-Pierre Hubaux
    BISS: building secure routing out of an incomplete set of security associations. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:21-29 [Conf]
  47. Jun Luo, Patrick Th. Eugster, Jean-Pierre Hubaux
    Probabilistic reliable multicast in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2004, v:2, n:4, pp:369-386 [Journal]
  48. Srdjan Capkun, Maher Hamdi, Jean-Pierre Hubaux
    GPS-free Positioning in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 2002, v:5, n:2, pp:157-167 [Journal]
  49. Falk Dietrich, Jean-Pierre Hubaux
    Formal methods for communication services: meeting the industry expectations. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2002, v:38, n:1, pp:99-120 [Journal]
  50. Jean-Pierre Hubaux, Constant Gbaguidi, Shawn Koppenhoefer, Jean-Yves Le Boudec
    The Impact of the Internet on Telecommunication Architectures. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:3, pp:257-273 [Journal]
  51. Falk Dietrich, Xavier Logean, Jean-Pierre Hubaux
    Modeling and testing object-oriented distributed systems with linear-time temporal logic. [Citation Graph (0, 0)][DBLP]
    Concurrency and Computation: Practice and Experience, 2001, v:13, n:5, pp:385-420 [Journal]
  52. Jean-Pierre Hubaux, Srdjan Capkun, Jun Luo
    The Security and Privacy of Smart Vehicles. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:49-55 [Journal]
  53. Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun
    A formal model of rational exchange and its application to the analysis of Syverson's protocol. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:3-4, pp:551-587 [Journal]
  54. Maxim Raya, Jean-Pierre Hubaux
    Securing vehicular ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2007, v:15, n:1, pp:39-68 [Journal]
  55. Jean-Paul Gaspoz, Jean-Pierre Hubaux, Simon Znaty
    A General Architecture for VPN Configuration Management. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 1996, v:4, n:4, pp:3745-395 [Journal]
  56. Constant Gbaguidi, Simon Znaty, Jean-Pierre Hubaux
    Multimedia Resources: An Information Model and Its Application to an MPEG2 Video Codec. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 1998, v:6, n:3, pp:- [Journal]
  57. Jean-Philippe Martin-Flatin, Simon Znaty, Jean-Pierre Hubaux
    A Survey of Distributed Enterprise Network and Systems Management Paradigms. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 1999, v:7, n:1, pp:- [Journal]
  58. Levente Buttyán, Jean-Pierre Hubaux
    Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MONET, 2003, v:8, n:5, pp:579-592 [Journal]
  59. Levente Buttyán, Jean-Pierre Hubaux
    Report on a working session on security in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2003, v:7, n:1, pp:74-94 [Journal]
  60. David B. Johnson, Jean-Pierre Hubaux
    Report on the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002). [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:7-9 [Journal]
  61. Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakobsson
    Reputation-based Wi-Fi deployment. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2005, v:9, n:3, pp:69-81 [Journal]
  62. Márk Félegyházi, Jean-Pierre Hubaux
    Wireless operators in a shared spectrum. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2006, v:10, n:4, pp:13-14 [Journal]
  63. Jun Luo, Jean-Pierre Hubaux, Patrick Th. Eugster
    DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:4, pp:311-323 [Journal]
  64. Raffaele Noro, Jean-Pierre Hubaux
    Clock synchronization of MPEG-2 services over packet networks. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 1999, v:11, n:1-2, pp:3-16 [Journal]
  65. Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux
    Self-Organized Public-Key Management for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2003, v:2, n:1, pp:52-64 [Journal]
  66. Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán
    Mobility Helps Peer-to-Peer Security. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:1, pp:43-51 [Journal]
  67. Jun Luo, Patrick Th. Eugster, Jean-Pierre Hubaux
    Pilot: Probabilistic Lightweight Group Communication System for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2004, v:3, n:2, pp:164-179 [Journal]
  68. Márk Félegyházi, Jean-Pierre Hubaux, Levente Buttyán
    Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:5, pp:463-476 [Journal]
  69. Maxim Raya, Imad Aad, Jean-Pierre Hubaux, Alaeddine El Fawal
    DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:12, pp:1691-1705 [Journal]
  70. Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson
    Node Cooperation in Hybrid Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:4, pp:365-376 [Journal]
  71. Mario Cagalj, Srdjan Capkun, Jean-Pierre Hubaux
    Wormhole-Based Antijamming Techniques in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:1, pp:100-114 [Journal]
  72. Mario Zagalj, Jean-Pierre Hubaux, Christian C. Enz
    Energy-Efficient Broadcasting in All-Wireless Networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2005, v:11, n:1-2, pp:177-188 [Journal]
  73. Márk Félegyházi, Mario Cagalj, Shirin Saeedi Bidokhti, Jean-Pierre Hubaux
    Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1442-1450 [Conf]
  74. Márk Félegyházi, Mario Cagalj, Diego Dufour, Jean-Pierre Hubaux
    Border Games in Cellular Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:812-820 [Conf]
  75. Jun Luo, Hersh V. Shukla, Jean-Pierre Hubaux
    Non-Interactive Location Surveying for Sensor Networks with Mobility-Differentiated ToA. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  76. Márk Félegyházi, Jean-Pierre Hubaux
    Wireless Operators in a Shared Spectrum. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]

  77. How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET. [Citation Graph (, )][DBLP]


  78. Secure neighbor discovery in wireless networks: formal investigation of possibility. [Citation Graph (, )][DBLP]


  79. Revocation games in ephemeral networks. [Citation Graph (, )][DBLP]


  80. Towards provable secure neighbor discovery in wireless networks. [Citation Graph (, )][DBLP]


  81. On non-cooperative location privacy: a game-theoretic analysis. [Citation Graph (, )][DBLP]


  82. SensorTune: a mobile auditory interface for DIY wireless sensor networks. [Citation Graph (, )][DBLP]


  83. Security Mechanisms with Selfish Players in Wireless Networks. [Citation Graph (, )][DBLP]


  84. On Wireless Social Community Networks. [Citation Graph (, )][DBLP]


  85. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. [Citation Graph (, )][DBLP]


  86. On the Age of Pseudonyms in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  87. Analysis and Optimization of Cryptographically Generated Addresses. [Citation Graph (, )][DBLP]


  88. Efficient secure aggregation in VANETs. [Citation Graph (, )][DBLP]


  89. Efficient and robust pseudonymous authentication in VANET. [Citation Graph (, )][DBLP]


  90. The security of VANETs. [Citation Graph (, )][DBLP]


  91. Certificate revocation list distribution in vehicular communication systems. [Citation Graph (, )][DBLP]


  92. On the Optimal Placement of Mix Zones. [Citation Graph (, )][DBLP]


  93. Optimal pricing strategy for wireless social community networks. [Citation Graph (, )][DBLP]


  94. Optimal revocations in ephemeral networks: A game-theoretic framework. [Citation Graph (, )][DBLP]


  95. The security of vehicular networks. [Citation Graph (, )][DBLP]


  96. Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. [Citation Graph (, )][DBLP]


  97. On the tradeoff between trust and privacy in wireless ad hoc networks. [Citation Graph (, )][DBLP]


  98. Effectiveness of distance-decreasing attacks against impulse radio ranging. [Citation Graph (, )][DBLP]


  99. A practical secure neighbor verification protocol for wireless sensor networks. [Citation Graph (, )][DBLP]


  100. GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries. [Citation Graph (, )][DBLP]


  101. Fast Exclusion of Errant Devices from Vehicular Networks. [Citation Graph (, )][DBLP]


  102. Towards Provable Secure Neighbor Discovery in Wireless Networks [Citation Graph (, )][DBLP]


  103. GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries [Citation Graph (, )][DBLP]


  104. Report on the "Secure Vehicular Communications: Results and Challenges Ahead" Workshop [Citation Graph (, )][DBLP]


  105. Impact of Vehicular Communications Security on Transportation Safety [Citation Graph (, )][DBLP]


  106. Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility [Citation Graph (, )][DBLP]


  107. Efficient and Robust Secure Aggregation for Sensor Networks [Citation Graph (, )][DBLP]


  108. Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges [Citation Graph (, )][DBLP]


  109. How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET [Citation Graph (, )][DBLP]


  110. Wireless Sensor Networking for Rain-fed Farming Decision Support [Citation Graph (, )][DBLP]


  111. VANET Connectivity Analysis [Citation Graph (, )][DBLP]


  112. Secure Vehicular Communication Systems: Design and Architecture [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.760secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002