Author of the publication

Effective algorithms for finding optimum pairs of link-disjoint paths in α+1 path protection.

, and . Telecommun. Syst., 52 (2): 783-797 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparing Network Resilience Against Distributed-Denial-of-Service (DDoS) on the Cloud., , , and . ACeS, volume 1347 of Communications in Computer and Information Science, page 523-534. Springer, (2020)An optimum paths-finding algorithm for ±+1 path protection., and . ICUMT, page 531-537. IEEE, (2010)Automatic Attendance Taking: A Proof of Concept on Privacy Concerns in 802.11 MAC Address Probing., , and . ACeS, volume 1132 of Communications in Computer and Information Science, page 274-288. Springer, (2019)A Fast, Adaptive, and Energy-Efficient Data Collection Protocol in Multi-Channel-Multi-Path Wireless Sensor Networks., , , and . IEEE Comput. Intell. Mag., 13 (1): 30-40 (2018)Toggling dual label: an exact algorithm for finding the optimal pair of link-disjoint paths in α + 1 path protection., and . Telecommun. Syst., 61 (3): 451-469 (2016)A semantic-aware log generation method for network activities., , , and . Int. J. Inf. Sec., 21 (2): 161-177 (2022)Intent-Based Network Policy to Solution Architecting Recommendations., , , and . Int. J. Bus. Data Commun. Netw., 17 (1): 55-74 (2021)Group Key Management in Internet of Things: A Systematic Literature Review., , , and . IEEE Access, (2023)Keystroke Dynamics in Mobile Platform., , , , and . EBIMCS, page 11:1-11:8. ACM, (2019)Effective algorithms for finding optimum pairs of link-disjoint paths in α+1 path protection., and . Telecommun. Syst., 52 (2): 783-797 (2013)