Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards jamming-resistant and competitive medium access in the SINR model., , , and . S3@MobiCom, page 33-36. ACM, (2011)A Self-stabilizing and Local Delaunay Graph Construction., , , and . ISAAC, volume 5878 of Lecture Notes in Computer Science, page 771-780. Springer, (2009)New Facets of Semantic Interoperability: Adding JSON - JSON-LD Transformation Functionality to the BIG IoT API., , and . International Semantic Web Conference (Posters, Demos & Industry Tracks), volume 1963 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)On Polynomial-Time Congestion-Free Software-Defined Network Updates., , , , and . Networking, page 1-9. IEEE, (2019)AHAB: Data-Driven Virtual Cluster Hunting., , , , , , and . Networking, page 379-387. IFIP, (2018)Charting the Complexity Landscape of Virtual Network Embeddings., and . Networking, page 55-63. IFIP, (2018)Autonomic Wireless Network Management., , , , and . WAC, volume 3854 of Lecture Notes in Computer Science, page 57-70. Springer, (2005)Tomographic Node Placement Strategies and the Impact of the Routing Model., , and . SIGMETRICS (Abstracts), page 75-77. ACM, (2018)Poisoning the Kad Network., , , and . ICDCN, volume 5935 of Lecture Notes in Computer Science, page 195-206. Springer, (2010)Towards Transiently Secure Updates in Asynchronous SDNs., , , , , and . SIGCOMM, page 597-598. ACM, (2016)