Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SEEMLESS: Distributed Algorithm for Topology Control of Survivable Energy Efficient Multihop Wireless Sensor Networks Using Adjustable Transmission Power.. SNPD, page 268-273. IEEE Computer Society, (2005)PKI Vulnerability and x-Cryptography in Grid Computing Networks.. HPCNCS, page 201-205. ISRST, (2008)A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 3 (1/2): 82-98 (2012)Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks., , , and . ICPP Workshops, page 224-232. IEEE Computer Society, (2002)Improving computer science diversity through summer camps., , , and . SIGCSE, page 180-181. ACM, (2008)Restoration in IP over WDM Optical Networks., , and . ICPP Workshops, page 263-270. IEEE Computer Society, (2001)An XML-Based Impact Analysis Using Security Management with IAVN., , and . Security and Management, page 217-220. CSREA Press, (2004)Uninterruptible Reconfiguration for Dynamic Resource Management in a Grid Computing Network against a Single Link Attack/Failure.. HPCNCS, page 71-76. ISRST, (2007)Survivable Embedding of Logical Topology in WDM Ring Networks., , , and . JCIS, page 1335-1339. JCIS / Association for Intelligent Machinery, Inc., (2002)Survivable embedding of logical topologies in WDM ring networks., , , and . Inf. Sci., 149 (1-3): 151-160 (2003)