Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multicast scheduling for scalable video streaming in wireless networks., and . MMSys, page 77-88. ACM, (2010)A Benders Decomposition Approach for Resilient Placement of Virtual Process Control Functions in Mobile Edge Clouds., and . IEEE Trans. Network and Service Management, 15 (4): 1460-1472 (2018)Next Steps in Security for Time Synchronization: Experiences from implementing IEEE 1588 v2.1., , , , and . ISPCS, page 1-6. IEEE, (2019)Joint Wireless and Edge Computing Resource Management with Dynamic Network Slice Selection., and . CoRR, (2020)The impact of caching on BitTorrent-like peer-to-peer systems, , , , and . 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), page 1--10. IEEE, (2010)Optimal Service Caching and Pricing in Edge Computing: A Bayesian Gaussian Process Bandit Approach., and . IEEE Trans. Mob. Comput., 23 (1): 705-718 (January 2024)A Bayesian Nash equilibrium-based moving target defense against stealthy sensor attacks., , , and . CoRR, (2021)An Active Learning Approach to Dynamic Alert Prioritization for Real-time Situational Awareness., and . CNS, page 154-162. IEEE, (2022)Cliffhanger: An Experimental Evaluation of Stateful Serverless at the Edge., , , and . WONS, page 41-48. IEEE, (2024)A Scalable Formulation for Look-Ahead Security-Constrained Optimal Power Flow., , , and . IEEE Trans. Control. Netw. Syst., 9 (1): 138-150 (2022)