Author of the publication

A hybrid protection strategy based on node-disjointness against double failures in optical mesh networks.

, , , , and . Photonic Netw. Commun., 22 (1): 13-22 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Cache Timeout for Identifier-to-Locator Mappings with Handovers., , and . IEEE Trans. Network and Service Management, 10 (2): 204-217 (2013)A Gini Impurity-Based Interest Flooding Attack Defence Mechanism in NDN., , and . IEEE Communications Letters, 22 (3): 538-541 (2018)On the applicability of software defined networking to large scale networks., , , , and . ICCCN, page 1-6. IEEE, (2014)CoLoR: an information-centric internet architecture for innovations., , , , , and . IEEE Netw., 28 (3): 4-10 (2014)Insights for segment protection in survivable WDM mesh networks with SRLG constraints., , and . Photonic Netw. Commun., 14 (3): 361-368 (2007)A DHT-Based Identifier-to-Locator Mapping Approach for a Scalable Internet., , and . IEEE Trans. Parallel Distributed Syst., 20 (12): 1790-1802 (2009)NLBA: A novel provider mobility support approach in mobile NDN environment., , and . CCNC, page 188-193. IEEE, (2014)A network-based mobility management scheme for future Internet., , , , and . Comput. Electr. Eng., 36 (2): 291-302 (2010)Insights for Segment Protection in Survivable WDM Mesh Networks with SRLG Constraints., , and . GLOBECOM, IEEE, (2006)The Performance Analysis of the Multicast Extension Support for Proxy MIPv6., , , , and . Wireless Personal Communications, 61 (4): 657-677 (2011)