Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Delay Tomography from End-to-End Unicast Measurements., , , and . IWDC, volume 2170 of Lecture Notes in Computer Science, page 576-595. Springer, (2001)Monitoring and early warning for internet worms., , , and . ACM Conference on Computer and Communications Security, page 190-199. ACM, (2003)Allocating Programs Containing Branches and Loops Within a Multiple Processor System.. IEEE Trans. Software Eng., 12 (10): 1018-1024 (1986)Correction: IEEE Trans. Software Eng. 16(4): 472 (1990).On the throughput of degenerate intersection and first-come first-served collision resolution algorithms., , and . IEEE Trans. Inf. Theory, 31 (2): 274-279 (1985)Modeling content availability in peer-to-peer swarming systems., , , , and . SIGMETRICS Perform. Evaluation Rev., 37 (2): 87-88 (2009)Smoothing variable-bit-rate video in an Internetwork., and . IEEE/ACM Trans. Netw., 7 (2): 202-215 (1999)Proxy-assisted techniques for delivering continuous multimedia streams., , and . IEEE/ACM Trans. Netw., 11 (6): 884-894 (2003)A Study on the Performance of a Three-Stage Load-Balancing Switch., , , and . IEEE/ACM Trans. Netw., 22 (1): 52-65 (2014)Queuing Network Models with State-Dependent Routing.. J. ACM, 27 (2): 323-337 (1980)Optimal scheduling policies for a class of queues with customer deadlines to the beginning of service., , and . J. ACM, 35 (4): 832-844 (1988)