From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions., и . INFOCOM, стр. 603-610. IEEE Computer Society, (1996)Design of MAC protocols for DWADM-based metropolitan-area optical ring networks., и . GLOBECOM, стр. 1575-1579. IEEE, (2001)Optimal Network Function Virtualization Realizing End-to-End Requests., , , и . GLOBECOM, стр. 1-6. IEEE, (2015)Online connection provisioning in metro optical WDM networks using reconfigurable OADMS (ROADMS)., и . LANMAN, стр. 7-10. IEEE, (2004)Cost-efficient design for higher capacity hybrid wireless-optical broadband access network (WOBAN)., , , , , и . Comput. Networks, 55 (9): 2138-2149 (2011)LVMSR: an efficient algorithm to multicast layered video., , , и . Comput. Networks, 41 (4): 363-383 (2003)Disaster survivability in optical communication networks., , , и . Comput. Commun., 36 (6): 630-644 (2013)A novel approach to provision differentiated services in survivable IP-over-WDM networks., , , , и . Opt. Switch. Netw., 5 (2-3): 170-176 (2008)A Journey Through the DQDB Network Literature., и . Perform. Evaluation, 16 (1-3): 129-158 (1992)Interference-aware routing for multi-hop Wireless Mesh Networks., , , и . Comput. Commun., 33 (16): 1961-1971 (2010)