Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Curvature of the Internet and its usage for Overlay Construction and Distance Estimation., and . INFOCOM, IEEE, (2004)On the Applicability of Peer-to-peer Data in Music Information Retrieval Research., , , and . ISMIR, page 273-278. International Society for Music Information Retrieval, (2010)Song Ranking based on Piracy in Peer-to-Peer Networks., and . ISMIR, page 633-638. International Society for Music Information Retrieval, (2009)Bringing order to BGP: Decreasing time and message complexity., , , , and . Comput. Networks, 53 (12): 2241-2256 (2009)DIMES: let the internet measure itself., and . Comput. Commun. Rev., 35 (5): 71-74 (2005)Analysis of one-way reservation algorithms., , and . J. High Speed Networks, 5 (4): 347-363 (1996)On the benefits of cheating by self-interested agents in vehicular networks., , and . AAMAS, page 183. IFAAMAS, (2007)Message Terminate Algorithms for Anonymous Rings of Unknown Size., and . WDAG, volume 647 of Lecture Notes in Computer Science, page 264-276. Springer, (1992)Routing through networks with hierarchical topology aggregation., , , and . ISCC, page 406-412. IEEE Computer Society, (1998)A Relaxed FPTAS for Chance-Constrained Knapsack., , and . ISAAC, volume 123 of LIPIcs, page 72:1-72:12. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)