Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Core-concavity, Gain Functions and Axioms for Information Leakage., , and . The Art of Modelling Computational Systems, volume 11760 of Lecture Notes in Computer Science, page 261-275. Springer, (2019)Optimal propagation of security patches in mobile wireless networks: extended abstract., , and . SIGMETRICS, page 355-356. ACM, (2010)Optimal routing and scheduling in wireless networks with nodes powered by renewable and traditional energy sources., , and . BlackSeaCom, page 186-190. IEEE, (2013)Market-based control of epidemics., , and . Allerton, page 314-320. IEEE, (2011)Pseudo-Random Number Generation Using Generative Adversarial Networks., , and . Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML, volume 11329 of Lecture Notes in Computer Science, page 191-200. Springer, (2018)Leakage-Minimal Design: Universality, Limitations, and Applications., and . CSF, page 305-317. IEEE Computer Society, (2017)Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design., and . CSF, page 61-76. IEEE Computer Society, (2016)Optimal Energy-Aware Epidemic Routing in DTNs., , , , and . CoRR, (2014)Optimal Patching in Clustered Malware Epidemics., , , and . CoRR, (2014)A fair scheduling policy for wireless channels with intermittent connectivity., , , and . CISS, page 503-508. IEEE, (2008)