Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated networking technologies for a survivable network military network applications., , , , , , , , , and 4 other author(s). WCNC, page 2424-2429. IEEE, (2005)Protocol overhead versus router processing and memory tradeoffs in evaluating BGP inbound soft reset mechanisms for tactical IP networks., , , and . CollaborateCom, page 1-7. ICST / IEEE, (2009)An empirical study of TCP/IP performance over FR/ATM service interworking.. Int. J. Netw. Manag., 8 (6): 343-355 (1998)Symbolic simulation: theory and application to protocol modeling and validation., and . ICNP, page 117-125. IEEE Computer Society, (1994)DiffServ QoS and OLSR MANET Outdoor Demonstration., , , , , , , , , and 4 other author(s). ISADS, page 394-402. IEEE Computer Society, (2007)An empirical study of TCP/IP performance over ATM., , and . Comput. Commun., 21 (12): 1058-1069 (1998)Self Adaptive Robust Resource Allocation for Prioritized TCP Flows in Wireless Networks., , , , and . SASO Workshops, page 108-113. IEEE Computer Society, (2015)Adaptive, Network-Aware Cluster Selection for Cloud Computing in Wireless Networks., , , , , , , , , and . SASO Workshops, page 29-34. IEEE Computer Society, (2013)