Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting BGP anomalies with wavelet., , and . NOMS, page 465-472. IEEE, (2008)Scheduling optical packets in wavelength, time, and space domains for all-optical packet switching routers., , , and . ICC, page 1836-1842. IEEE, (2005)Avoiding Transient Loops Through Interface-Specific Forwarding., , , , , , and . IWQoS, volume 3552 of Lecture Notes in Computer Science, page 219-232. Springer, (2005)Capacity growth of multi-element arrays in indoor and outdoor wireless channels., , , , , and . WCNC, page 1340-1344. IEEE, (2000)MeasuRouting: A Framework for Routing Assisted Traffic Monitoring., , , , and . INFOCOM, page 1271-1279. IEEE, (2010)Graceful Network Operations., , and . INFOCOM, page 289-297. IEEE, (2009)Failure inferencing based fast rerouting for handling transient link and node failures., , , , , and . INFOCOM, page 2859-2863. IEEE, (2005)Uncovering the footprints of malicious traffic in wireless/mobile networks., , , , , and . Comput. Commun., (2016)Who Will Share My Image?: Predicting the Content Diffusion Path in Online Social Networks., , , , , and . WSDM, page 252-260. ACM, (2018)Fast local rerouting for handling transient link failures., , , , and . IEEE/ACM Trans. Netw., 15 (2): 359-372 (2007)