From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Agile virtualized infrastructure to proactively defend against cyber attacks., , , , , и . INFOCOM, стр. 729-737. IEEE, (2015)Dynamic Topology Configuration in Service Overlay Networks: A Study of Reconfiguration Policies., и . INFOCOM, IEEE, (2006)A novel multicast scheduling scheme for multimedia servers with variable access patterns., и . ICC, стр. 875-879. IEEE, (2003)D-book: a mobile social networking application for delay tolerant networks., , , , и . Challenged Networks, стр. 113-116. ACM, (2008)Design and analysis of techniques for mapping virtual networks to software-defined network substrates., и . Comput. Commun., (2014)WHIM: watermarking multicast video with a hierarchy of intermediaries., и . Comput. Networks, 39 (6): 699-712 (2002)Application-layer anycasting: a server selection architecture and use in a replicated Web service., , , и . IEEE/ACM Trans. Netw., 8 (4): 455-466 (2000)Broadband ISDN: Standards, Switches, and Traffic Management., , и . Computer Networks and ISDN Systems, 27 (1): 1-3 (1994)The Use of Multicast Delivery to Provide a Scalable and Interactive Video-on-Demand Service., и . IEEE J. Sel. Areas Commun., 14 (6): 1110-1122 (1996)Towards resource sharing in mobile device clouds: power balancing across mobile devices., , , и . Comput. Commun. Rev., 43 (4): 51-56 (2013)