Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Second order fluid models with general boundary behaviour., , , and . Ann. Oper. Res., 160 (1): 69-82 (2008)Population Protocols with Convergence Detection., , and . NCA, page 1-8. IEEE, (2018)Probabilistic analysis of counting protocols in large-scale asynchronous and anonymous systems., , and . NCA, page 315-322. IEEE Computer Society, (2017)Enhancing dynamic adaptive streaming over HTTP for multi-homed users using a Multi-Armed Bandit algorithm., , , and . IWCMC, page 692-697. IEEE, (2019)Probabilistic Analysis of Rumor-Spreading Time., , and . INFORMS J. Comput., 32 (1): 172-181 (2020)Transient analysis of a fluid buffer driven by a general birth and death process, and . page 919-928. (2005)Volume and duration of losses in finite buffer fluid queues., and . J. Appl. Probab., 52 (3): 826-840 (2015)Loss Probability Computation in the MAP/PH/1/K Queue.. ESM, page 773-777. SCS, The Society for Computer Simulation International, (1996)Evaluating the Quality of a Network Topology through Random Walks., , , and . DISC, volume 5218 of Lecture Notes in Computer Science, page 509-511. Springer, (2008)MD-GAN: Multi-Discriminator Generative Adversarial Networks for Distributed Datasets., , and . IPDPS, page 866-877. IEEE, (2019)