Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Core-concavity, Gain Functions and Axioms for Information Leakage., , and . The Art of Modelling Computational Systems, volume 11760 of Lecture Notes in Computer Science, page 261-275. Springer, (2019)Optimal propagation of security patches in mobile wireless networks: extended abstract., , and . SIGMETRICS, page 355-356. ACM, (2010)Optimal routing and scheduling in wireless networks with nodes powered by renewable and traditional energy sources., , and . BlackSeaCom, page 186-190. IEEE, (2013)Channel Ordering and Supermodularity., , and . ITW, page 1-5. IEEE, (2019)Managing the adoption of asymmetric bidirectional firewalls: Seeding and mandating., , and . GLOBECOM, page 911-916. IEEE, (2012)An economic analysis of regulating security investments in the Internet., , and . INFOCOM, page 818-826. IEEE, (2013)Optimal control of epidemic evolution., , and . INFOCOM, page 1683-1691. IEEE, (2011)Optimal Quarantining of Wireless Malware Through Reception Gain Control., , and . IEEE Trans. Automat. Contr., 57 (1): 49-61 (2012)A fair scheduling policy for wireless channels with intermittent connectivity., , , and . CISS, page 503-508. IEEE, (2008)Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks., , and . CDC, page 2354-2359. IEEE, (2010)