Author of the publication

Biological Models of Security for Virus Propagation in Computer Networks.

, and . login Usenix Mag., (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A control and management network for wireless ATM systems., , , , , , and . Wireless Networks, 3 (4): 267-283 (1997)Sync and Swarm Behavior for Sensor Networks. Joint IEEE Communications Society and Aerospace Chapter Presentation, (June 2005)Rochester, NY, USA.The Design and Analysis of Virtual Network Configuration for a Wireless Mobile ATM Network. University of Kansas, (August 1997)Islands of Near-Perfect Self-Prediction. Proceedings of VWsim'00: Virtual Worlds and Simulation Conference, WMC'00: 2000 SCS Western Multi-Conference, San Diego, SCS (2000), (January 2000)Active Virtual Network Management Prediction. PADS '99, (May 1999)Low-Energy Network Time Synchronization as an Emergent Property. Proceedings of the Fourteenth International Conference on Computer Communications and Networks (IEEE ICCCN), (October 2005)San Diego, California USA.Low-energy sensor network time synchronization as an emergent property.. ICCCN, page 93-98. IEEE, (2005)The Impact of Persistence Length on the Communication Efficiency of Microtubules and CNTs., and . NanoNet, volume 20 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-13. Springer, (2009)Brittle System Analysis, , and . CoRR, (1999)A Control and Management Network for Wireless ATM Systems, , , , , and . CoRR, (1999)