Author of the publication

Brocade: Landmark Routing on Overlay Networks.

, , , , and . IPTPS, volume 2429 of Lecture Notes in Computer Science, page 34-44. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GPR simulation based on complex frequency shifted recursive integration PML boundary of 3D high order FDTD., , , and . Computers & Geosciences, (2012)Mixed Backlogging and Outsourcing Models with Nondecreasing Inventory Capacity., , , and . ISDA (1), page 1161-1166. IEEE Computer Society, (2006)Disturbance attenuation observer design for fuzzy time-delay system with fault1., , , and . Journal of Intelligent and Fuzzy Systems, 30 (2): 811-819 (2016)What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications., , , , and . IEEE Trans. Information Forensics and Security, 10 (1): 200-212 (2015)Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays., , , , and . ICNP, page 246-257. IEEE Computer Society, (2003)Design and Implementation of Library Books Search and Management System Using RFID Technology., , , , and . INCoS, page 392-397. IEEE, (2016)Time delay compensation for positive nonlinear networked control systems with bounded controls., , and . FUZZ-IEEE, page 1926-1933. IEEE, (2016)Morpheus: benchmarking computational diversity in mobile malware., , , and . HASP@ISCA, page 3:1-3:8. ACM, (2014)EMMA: A New Platform to Evaluate Hardware-based Mobile Malware Analyses., , , and . CoRR, (2016)Multi-view intact space clustering., , and . Pattern Recognition, (2019)