Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Double-Link Failure Protection Algorithm in WDM Mesh Networks., , , and . Communications in Computing, page 120-126. CSREA Press, (2004)Dynamic routing and assignment of wavelength algorithms in multi-fiber wavelength division multiplexing networks., , and . ICCCN, page 332-337. IEEE, (1999)Maximum throughput of an input queueing packet switch with two priority classes., , and . IEEE Trans. Commun., 42 (12): 3095-3097 (1994)Every word is valuable: Studied influence of negative words that spread during election period in social media., , , , , and . Concurr. Comput. Pract. Exp., (2019)Dynamic service-level-agreement aware shared-path protection in WDM mesh networks., , and . J. Netw. Comput. Appl., 30 (2): 429-444 (2007)A new shared-risk link groups (SRLG)-disjoint path provisioning with shared protection in WDM optical networks., , , and . J. Netw. Comput. Appl., 30 (2): 650-661 (2007)Optical Communications New and enhanced protection scheme in survivable meshed WDM optical networks., , , and . Eur. Trans. Telecommun., 18 (2): 163-168 (2007)Clock Recovery for CBR Traffic in Wireless ATM Networks., , , and . ICC (1), page 16-20. IEEE, (1997)Achieving Shared Protection for Dynamic Multicast Sessions in Survivable Mesh WDM Networks., , , and . IEEE J. Sel. Areas Commun., 25 (S-9): 83-95 (2007)Network Capacity of Wireless Ad Hoc Networks with Delay Constraint., , and . MSN, volume 3794 of Lecture Notes in Computer Science, page 453-465. Springer, (2005)