Author of the publication

A Time Driven Methodology for Key Dimensioning in Multicast Communications.

, , and . SEC, volume 250 of IFIP Conference Proceedings, page 121-132. Kluwer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

P-Bandwidth Priority Queues on Reconfigurable Tree of Meshes., and . J. Parallel Distributed Comput., 40 (2): 248-255 (1997)String Natching on Nulticontext FPGAs Using Self-Reconfiguration., , and . FPGA, page 217-226. ACM, (1999)Exploiting Delay Patterns for User IPs Identification in Cellular Networks., , and . Privacy Enhancing Technologies, volume 8555 of Lecture Notes in Computer Science, page 224-243. Springer, (2014)The parallel lives of autonomous systems: ASN allocations vs. BGP., , , , , and . Internet Measurement Conference, page 593-611. ACM, (2021)Can't Touch This: Using Hover to Compromise the Confidentiality of User Input on Android., , , , and . CoRR, (2016)Routing in Outer Space., and . INFOCOM, page 2234-2242. IEEE, (2008)Uncovering hidden social relationships through location-based services: The Happn case study., , and . INFOCOM Workshops, page 802-807. IEEE, (2018)Mobile Cloud Performance Evaluation Using Stochastic Models., , , , , , and . IEEE Trans. Mob. Comput., 17 (5): 1134-1147 (2018)Supporting interoperability of things in IoT systems., , , and . SenSys, page 71:1-71:2. ACM, (2013)Towards threat-adaptive dynamic fragment replication in large scale distributed systems., , and . IPDPS, page 1. IEEE, (2007)