Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Loading Time Scheduling Problem., , and . J. Algorithms, 36 (1): 1-33 (2000)Facility Location with Dynamic Distance Functions., , , and . J. Comb. Optim., 2 (3): 199-217 (1998)Multidimensional Declustering Schemes Using Golden Ratio and Kronecker Sequences., , and . IEEE Trans. Knowl. Data Eng., 15 (3): 659-670 (2003)Hierarchical Declustering Schemes for Range Queries., , and . EDBT, volume 1777 of Lecture Notes in Computer Science, page 525-537. Springer, (2000)Designing networks with hop bounded protection paths., , and . IWQoS, page 164-172. IEEE, (2007)A Policy-based Network Management System., , , and . IC-AI, page 465-471. CSREA Press, (1999)Analysis of bandwidth allocation algorithms for wireless personal area networks., , and . Wireless Networks, 12 (5): 589-603 (2006)Throughput Optimization of Wireless Mesh Networks with MIMO Links., and . INFOCOM, page 2326-2330. IEEE, (2007)On local search and placement of meters in networks., , and . SODA, page 319-328. ACM/SIAM, (2000)Fast Network Re-optimization Schemes for MPLS and Optical Networks., , and . IWQoS, volume 2707 of Lecture Notes in Computer Science, page 249-265. Springer, (2003)