Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Jaekel, Arunita
add a person with the name Jaekel, Arunita
 

Other publications of authors with the same name

Security-Aware Dynamic RWA for Reducing In-band and Out-of-band Jamming Attacks in WDM Optical Networks., , , and . JNW, 10 (11): 587-596 (2015)Traffic grooming of scheduled demands for minimizing energy consumption., , , , and . Photonic Network Communications, 29 (2): 151-163 (2015)Strategies for optimal logical topology design and traffic grooming., , , and . Photonic Network Communications, 19 (2): 223-232 (2010)On a virtual wavelength translation scheme for routing in all-optical networks., , and . IPCCC, page 403-411. IEEE, (1999)A Comparative Study of Schemes for Robust Logical Topology Design in Wavelength Routed WDM Networks., , , and . Wireless and Optical Communications, page 230-236. IASTED/ACTA Press, (2006)Optimal placement and routing strategies for resilient two-tiered sensor networks., , and . Wireless Communications and Mobile Computing, 9 (7): 920-937 (2009)Energy-Efficient Design Techniques for Large-scale, Two-tiered Sensor Networks., , and . Ad Hoc & Sensor Wireless Networks, 11 (1-2): 137-164 (2011)Optimal regenerator placement in survivable translucent networks., , , and . DRCN, page 1-7. IEEE, (2014)Joint scheduling and virtual topology design for sliding periodic traffic., , and . Optical Switching and Networking, 10 (3): 186-194 (2013)Identifying Vulnerabilities and Attacking Capabilities Against Pseudonym Changing Schemes in VANET., , and . ISDDC, volume 11317 of Lecture Notes in Computer Science, page 1-15. Springer, (2018)