Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Minimizing node churn in peer-to-peer streaming., and . Computer Communications, 33 (14): 1598-1614 (2010)Characterization and multiplexing of correlated traffic from sources with different time constants.. Computer Communications, 19 (13): 1112-1123 (1996)A specification-based intrusion detection engine for infrastructure-less networks., , , and . Computer Communications, (2014)A Markov Service Policy with Application to the Queueing Study of a DQDB Station., and . Computer Networks and ISDN Systems, 26 (12): 1503-1522 (1994)Adaptive rate control in high-speed networks: performance issues., and . Computer Networks, 37 (3/4): 363-382 (2001)Large impact of temporal/spatial correlations on per-session performance measures: single and multiple node cases., , and . Perform. Eval., 41 (2-3): 83-116 (2000)Social Similarity Favors Cooperation: The Distributed Content Replication Case., , and . IEEE Trans. Parallel Distrib. Syst., 24 (3): 601-613 (2013)Parking Assisting Applications: Effectiveness and Side-Issues in Managing Public Goods., , and . SASO Workshops, page 77-82. IEEE Computer Society, (2013)MAD: A dynamically adjustable hybrid location-and motion-based routing protocol for VANETs., , , and . ISWCS, page 696-700. IEEE, (2010)A generic mechanism for efficient authentication in B3G networks., , and . Computers & Security, 29 (4): 460-475 (2010)