From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Defending Hash Tables from Subterfuge with Depth Charge., , и . ICDCN, стр. 134-143. ACM, (2024)Sleeping on the Job: Energy-Efficient and Robust Broadcast for Radio Networks., , , и . Algorithmica, 61 (3): 518-554 (2011)Towards Scalable Planning of Wireless Networks., , , , , и . IM, стр. 629-633. IFIP, (2019)Tiny Groups Tackle Byzantine Adversaries., , , , и . IPDPS, стр. 1030-1039. IEEE Computer Society, (2018)Interactive Communication with Unknown Noise Rate., , , и . ICALP (2), том 9135 из Lecture Notes in Computer Science, стр. 575-587. Springer, (2015)Defending hash tables from algorithmic complexity attacks with resource burning., , и . Theor. Comput. Sci., (2024)Softening the Impact of Collisions in Contention Resolution., , и . SSS, том 14931 из Lecture Notes in Computer Science, стр. 398-416. Springer, (2024)A resource-competitive jamming defense., , , и . Distributed Comput., 31 (6): 419-439 (2018)Windowed backoff algorithms for WiFi: theory and performance under batched arrivals., , и . Distributed Comput., 34 (5): 367-393 (2021)Scaling Exponential Backoff: Constant Throughput, Polylogarithmic Channel-Access Attempts, and Robustness., , , и . J. ACM, 66 (1): 6:1-6:33 (2019)