Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Support for resilient Peer-to-Peer gaming., and . Comput. Networks, 51 (14): 4212-4233 (2007)Overview., , and . Bell Labs Tech. J., 14 (2): 1-4 (2009)Multicast scheduling in cellular data networks., , , , , , and . IEEE Trans. Wirel. Commun., 8 (9): 4540-4549 (2009)Requet: Real-Time QoE Metric Detection for Encrypted YouTube Traffic., , , , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 16 (2s): 71:1-71:28 (2020)Scalable WiFi multicast services for very large groups., , , , , , and . ICNP, page 1-12. IEEE Computer Society, (2013)Routing Bandwidth Guaranteed Paths with Local Restoration in Label Switched Networks., , , and . ICNP, page 110-121. IEEE Computer Society, (2002)Scalable Stability Detection using Logical Hypercube., , and . SRDS, page 124-133. IEEE Computer Society, (1999)Optimal Customer Provisioning in Network-Based Mobile VPNs., , , and . MobiQuitous, page 95-104. IEEE Computer Society, (2004)Dynamic Light-Weight Groups., and . ICDCS, page 33-42. IEEE Computer Society, (1997)Towards edge-caching for image recognition., , , , and . PerCom Workshops, page 593-598. IEEE, (2017)