Author of the publication

Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network.

, , , , and . J. UCS, 8 (7): 698-721 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The CORBA-based unified event management framework in multi-layer networks., and . Computer Communications, 25 (3): 254-264 (2002)A Rerouting Scheme with Dynamic Control of Restoration Scope for Survivable MPLS Network., and . ICOIN, volume 3391 of Lecture Notes in Computer Science, page 233-243. Springer, (2005)A CORBA-Based Performance Management Framework for Multi-layer Network Environment., , , , and . ICOIN (1), volume 2343 of Lecture Notes in Computer Science, page 631-640. Springer, (2002)A Segment-based Protection Scheme for MPLS Network Survivability., , and . NOMS, IEEE, (2006)A QoS management framework for distributed multimedia systems., and . Int. Journal of Network Management, 13 (2): 115-127 (2003)A Configuration Algorithm for Provisioning of Cell-Based MPLS Network., , and . International Conference on Computational Science, volume 2660 of Lecture Notes in Computer Science, page 789-798. Springer, (2003)ANMP: Active Network Management Platform for Telecommunications Applications., and . ICN (2), volume 2094 of Lecture Notes in Computer Science, page 599-611. Springer, (2001)A Flow-Through Workflow Control Scheme for BGP/MPLS VPN Service Provision., and . ECUMN, volume 3262 of Lecture Notes in Computer Science, page 397-406. Springer, (2004)Network management with bounded flooding routing algorithm to ensure IP QoS over ATM virtual path network., and . NOMS, page 759-772. IEEE, (2000)Hierarchical VP restoration management system for a reliable ATM backbone network., and . Int. Journal of Network Management, 12 (4): 213-224 (2002)