Author of the publication

Strategies for Finding Stable Paths in Mobile Wireless Ad Hoc Networks.

, , , and . LCN, page 130-139. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MOBIP: Ein modulares Bildverarbeitungssystem mit Parallelrechner., and . Elektronische Rechenanlagen, 25 (2): 55-65 (1983)About prefix hijacking in the Internet., and . LCN, page 143-146. IEEE Computer Society, (2011)Simulative Evaluation of Adaptive Jamming Detection in Wireless Multi-hop Networks., , and . ICDCS Workshops, page 213-220. IEEE Computer Society, (2010)TOGBAD - an approach to detect routing attacks in tactical environments., , and . Security and Communication Networks, 4 (8): 793-806 (2011)Temporal Overload in High Speed Backbone Networks., , and . INFOCOM, page 2280-2289. IEEE Computer Society, (1992)Adaptive Access Regulation for VBR Video Streams., and . MIPS, volume 2899 of Lecture Notes in Computer Science, page 16-29. Springer, (2003)Wormhole Detection using Topology Graph based Anomaly Detection (TOGBAD)., , and . ECEASST, (2011)A cooperative nearest neighbours topology control algorithm for wireless ad hoc networks., , , and . ICCCN, page 412-417. IEEE, (2003)Traffic characteristics and modeling of emergency calls at the PSAP., , and . MASCOTS, page 1-8. IEEE Computer Society, (2009)Detecting VoIP based DoS attacks at the public safety answering point., , , and . AsiaCCS, page 148-155. ACM, (2008)