Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Do You Know Where Your Headers Are? Comparing the Privacy of Network Architectures with Share Count Analysis., and . HotNets, page 4:1-4:7. ACM, (2015)Enabling near real-time central control for live video delivery in CDNs., , , , , , and . SIGCOMM, page 343-344. ACM, (2014)Supporting network evolution and incremental deployment with XIA., , , , , , and . SIGCOMM, page 281-282. ACM, (2012)Balancing accountability and privacy in the network., , and . SIGCOMM, page 75-86. ACM, (2014)Introduction to Convective Heat Transfer Analysis, and . McGraw-Hill, New York, (1999)Practical, Real-time Centralized Control for CDN-based Live Video Delivery., , , , , and . SIGCOMM, page 311-324. ACM, (2015)And Then There Were More: Secure Communication for More Than Two Parties., , , , and . CoNEXT, page 88-100. ACM, (2017)CORBA infrastructure for distributed learning and meta-learning., and . Knowl. Based Syst., 15 (1-2): 139-144 (2002)Design and application of neurocomputers.. Loughborough University, UK, (1994)British Library, EThOS.A Model Based Approach to the Performance Analysis of Multi-Layer Networks Realised in Linear Systolic Arrays., and . IWANN, volume 686 of Lecture Notes in Computer Science, page 459-464. Springer, (1993)