Author of the publication

Forwarding and Replication Strategies for DTN with Resource Constraints.

, , and . VTC Spring, page 1260-1264. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Friend Discovery via Privacy-Preserving and Decentralized Community Detection., , and . CoRR, (2014)Online Job Scheduling with Redundancy and Opportunistic Checkpointing: A Speedup-Function-Based Analysis., , , and . IEEE Trans. Parallel Distributed Syst., 30 (4): 897-909 (2019)Temporal Graph Representation Learning for Detecting Anomalies in E-payment Systems., , , , , , , and . ICDM (Workshops), page 983-990. IEEE, (2021)Accordia: Adaptive Cloud Configuration Optimization for Recurring Data-Intensive Applications., , and . ICDCS, page 831-841. IEEE, (2020)Vetting Single Sign-On SDK Implementations via Symbolic Reasoning., , , and . USENIX Security Symposium, page 1459-1474. USENIX Association, (2018)Temporal Modeling of Information Diffusion using MASEP: Multi-Actor Self-Exciting Processes., and . WWW (Companion Volume), page 1737-1742. ACM, (2018)Forwarding and Replication Strategies for DTN with Resource Constraints., , and . VTC Spring, page 1260-1264. IEEE, (2007)Link Restoration in Cognitive Radio Networks., , and . ICC, page 371-376. IEEE, (2008)Addressing job processing variability through redundant execution and opportunistic checkpointing: A competitive analysis., , and . INFOCOM, page 1-9. IEEE, (2017)Localized Algorithm of Community Detection on Large-Scale Decentralized Social Networks, and . CoRR, (2012)