Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integration of streaming services and TCP data transmission in the Internet, , , and . CoRR, (2006)Admission control of leaky bucket regulated sources in a queueing system with priority, , and . (2003)A leaky bucket with memory., , and . Broadband Communications, volume C-4 of IFIP Transactions, page 275-285. North-Holland, (1992)Virtualization Techniques for Redesigning Mobile Backhaul Networks: Challenges and Issues.. MobiArch, page 1. ACM, (2015)On pathwise rate conservation for a class of semi-martingales, , , and . Stochastic Processes and their Applications, 47 (1): 119--130 (August 1993)A Basic Requirement for the Policing Function in ATM Networks., and . Computer Networks and ISDN Systems, 24 (4): 311-320 (1992)Analysis of cell clumping caused by ATM network GFC protocols., and . Comput. Commun., 17 (9): 637-646 (1994)Volatility of YouTube content in Orange networks and consequences., , and . ICC, page 2381-2385. IEEE, (2013)A Microservice Migration Approach to Controlling Latency in 5G/6G Networks., , and . ICC, page 4912-4917. IEEE, (2023)IP Traffic Classification via Blind Source Separation Based on Jacobi Algorithm., , and . ECUMN, volume 3262 of Lecture Notes in Computer Science, page 287-296. Springer, (2004)