Author of the publication

Support of B-ISDN traffic on non - ATM LANs.

, , , , and . Broadband Communications, volume C-4 of IFIP Transactions, page 31-42. North-Holland, (1992)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TDOA Source-Localization Technique Robust to Timing Attacks., and . CoRR, (2019)End-to-end congestion control for TCP-friendly flows with variable packet size., , and . Comput. Commun. Rev., 34 (2): 137-151 (2004)Traps and pitfalls of using contact traces in performance studies of opportunistic networks., , and . INFOCOM, page 1377-1385. IEEE, (2012)Performance Evaluation of Impulse Radio UWB Networks Using Common or Private Acquisition Preambles., and . IEEE Trans. Mob. Comput., 8 (7): 865-879 (2009)Performance Evaluation of an IEEE 802.15.4a Physical Layer with Energy Detection and Multi-User Interference, , , and . IEEE International Conference on Ultra-Wideband (ICUWB 2007), (2007)Network coding for efficient communication in extreme networks., and . WDTN@SIGCOMM, page 284-291. ACM, (2005)Protection interoperability for WDM optical networks., , and . Multichannel Optical Networks: Theory and Practice, volume 46 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 129-142. DIMACS/AMS, (1998)Protection of data transmission in remote monitoring tools by anonymization., , , , and . IntelITSIS, volume 3373 of CEUR Workshop Proceedings, page 452-463. CEUR-WS.org, (2023)Efficient and Accurate Handling of Periodic Flows in Time-Sensitive Networks., , , and . RTAS, page 303-315. IEEE, (2023)A Palm Calculus Approach to the Distribution of the Age of Information., and . IEEE Trans. Inf. Theory, 69 (12): 8097-8110 (December 2023)