Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Control architecture in optical burst-switched WDM networks., , and . IEEE Journal on Selected Areas in Communications, 18 (10): 1838-1851 (2000)Survivable Impairment-Aware Traffic Grooming and Regenerator Placement with Dedicated Connection Level Protection., , , , , , , and . ICC, page 1-5. IEEE, (2011)Virtual optical network embedding in multi-domain optical networks., , , , , , and . GLOBECOM, page 2042-2047. IEEE, (2014)Access Control Lists.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Access Control from an OS Security Perspective.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Enhancing LOCATION Information Using Semantic Composition., , and . CSE, page 284-288. IEEE Computer Society, (2010)FOGPLAN: A Lightweight QoS-Aware Dynamic Fog Service Provisioning Framework., , , , , , , , and . IEEE Internet of Things Journal, 6 (3): 5080-5096 (2019)Survivable inter-domain routing based on topology aggregation with disjointness information in multi-domain optical networks., , and . GLOBECOM, page 3013-3018. IEEE, (2012)Group-scheduling for optical burst switched (OBS) networks., , , and . GLOBECOM, page 2745-2749. IEEE, (2003)Semantic composition of AT-LOCATION relation with other relations., , and . Natural Language Engineering, 18 (3): 343-374 (2012)