Author of the publication

An Optimal Routing Policy for Mesh-Connected Topologies.

. ICPP, Vol. 1, page 267-270. IEEE Computer Society, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavioral Detection and Containment of Proximity Malware in Delay Tolerant Networks., , , and . MASS, page 411-420. IEEE Computer Society, (2011)Polynomial Time and Provably Efficient Network Coding Scheme for Lossy Wireless Networks., , and . MASS, page 391-400. IEEE Computer Society, (2011)Topology Control for Secured Coverage in Wireless Sensor Networks., , , and . MASS, page 1-6. IEEE Computer Society, (2007)The Virtue of Patience: Offloading Topical Cellular Content through Opportunistic Links., , , and . MASS, page 402-410. IEEE Computer Society, (2013)Adaptive Backbone-Based Routing in Delay Tolerant Networks., and . MASS, page 356-364. IEEE Computer Society, (2013)An approach for systems evolution., and . SMC (3), page 2114-2118. IEEE, (2004)ATRAM - An Analysis Tool of Requirement and Architecture Management., and . SMC, page 2654-2660. IEEE, (2003)CPDID: A Novel CDN-P2P Dynamic Interactive Delivery Scheme for Live Streaming., , , , and . ICPADS, page 299-306. IEEE Computer Society, (2012)Social-tie-based information dissemination in mobile opportunistic social networks., and . WOWMOM, page 1-6. IEEE Computer Society, (2013)Transmit diversity based on multiplicative transformation for non-binary LDPC codes in MIMO systems., , , , and . PIMRC, page 1141-1145. IEEE, (2013)