Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An integrated soft handoff approach to IP fast reroute in wireless mobile networks., , , , , , , , , and 4 other author(s). COMSNETS, page 1-10. IEEE, (2010)On Single-Server Delegation of RSA., , , , , , and . SecITC, volume 13809 of Lecture Notes in Computer Science, page 81-101. Springer, (2022)SEDIMENT: An IoT-device-centric Methodology for Scalable 5G Network Security., , , , , , , , and . WCNC, page 49-54. IEEE, (2022)Multistage Indexing Algorithms for Speeding Prolog Execution., , and . JICSLP, page 639-653. MIT Press, (1992)final version: SP&E 24(12): 1097-1119 (1994).STORM: A MAny-to-One Associative-Commutative Matcher., and . RTA, volume 914 of Lecture Notes in Computer Science, page 414-419. Springer, (1995)Subsumption Algorithms Based on Search Trees., , , and . CAAP, volume 1059 of Lecture Notes in Computer Science, page 135-148. Springer, (1996)Non-Holonomic Constraints in Learning Blind Source Separation., , and . ICONIP (1), page 633-636. Springer, (1997)Experiments with Associative-Commutative Discrimination Nets., , , , and . IJCAI, page 348-355. Morgan Kaufmann, (1995)Enhancing application performance with network awareness in Tactical Networks., , , , , , and . MILCOM, page 1158-1163. IEEE, (2011)Advances in content transformation in heterogeneous tactical wireless networks., , , , , , , and . MILCOM, page 1574-1579. IEEE, (2011)