Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How do we encourage an egoist to act socially in an ad hoc mobile network?, , and . Computer Networks, 56 (15): 3499-3510 (2012)A Queuing Model of a Time-Sliced Priority-Driven Task Dispatching Algorithm., , and . IEEE Trans. Software Eng., 6 (2): 219-225 (1980)Online traffic engineering: the least interference optimization algorithm., , and . ICC, page 1232-1236. IEEE, (2004)A Multiclass Network Model of a Multiprogramming Timesharing Computer System., , and . IFIP Congress, page 481-486. North-Holland, (1977)Incentive-based control of ad hoc networks: A performance study., , and . Computer Networks, 53 (14): 2427-2443 (2009)The Design of ATM Virtual Path Connection Networks with Service Separation., , , and . MASCOTS, page 424-431. IEEE Computer Society, (2000)Improved Lineariser Methods for Queueing Networks with Queue Dependent Centres., and . SIGMETRICS, page 41-51. ACM, (1984)A Distributed Scheme for Value-Based Bandwidth Reconfiguration., , , and . FITraMEn, volume 5464 of Lecture Notes in Computer Science, page 16-35. Springer, (2008)Modelling incentives and protocols for collaboration in mobile ad hoc networks., and . MSWiM, page 78-85. ACM, (2008)Call admission and routing in ATM networks based on virtual path separation., and . Broadband Communications, volume 121 of IFIP Conference Proceedings, page 461-472. Chapman & Hall, (1998)