Author of the publication

Performance Issues in Optical Burst/Packet Switching.

, , , , , , , , , and 9 other author(s). COST Action 291 Final Report, volume 5412 of Lecture Notes in Computer Science, Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and implementation of a P2P communication infrastructure for WSN-based vehicular traffic control applications., , , and . Journal of Systems Architecture - Embedded Systems Design, 59 (10-B): 923-930 (2013)Fluid-flow approach to evaluate the information loss probability in a finite buffering switching node under heterogeneous ON/OFF input traffic sources., and . Perform. Eval., 51 (2/4): 153-169 (2003)Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths., , , , and . Computers & Security, 28 (8): 772-784 (2009)Automated spectrum trading mechanisms: understanding the big picture., , , and . Wireless Networks, 21 (2): 685-708 (2015)Tag Loss Probability Evaluation for a Continuous Flow of Tags in the EPC-Global Standard., , , and . IWRT, page 115-126. INSTICC PRESS, (2008)Background detection of primary user activity in Opportunistic Spectrum Access., , , and . ICC, page 1422-1427. IEEE, (2015)Distributed Path Restoration Algorithm for Anonymity in P2p File Sharing Systems., , , , and . ICSOFT (PL/DPS/KE/MUSE), page 88-95. INSTICC Press, (2007)Feasibility Study of MPEG-4 Transmission on IEEE 802.15.4 Networks., , and . WiMob, page 397-403. IEEE Computer Society, (2008)Design, Implementation and Evaluation of an Indoor Navigation System for Visually Impaired People., , , and . Sensors, 15 (12): 32168-32187 (2015)Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths., , , , and . Computers & Security, 28 (8): 772-784 (2009)