Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scheduling cooperative emergency response: or how the meek shall overcome the greedy., and . IWCMC, page 598-602. ACM, (2009)A Dynamic Route Optimization Mechanism for AODV in MANETs., and . ICC, page 1-5. IEEE, (2010)Average Linearization of Phased Array Transmitters Under Random Amplitude and Phase Variations., , , and . ISWCS, page 553-557. IEEE, (2019)OPTIPRISM: a distributed hierarchical network management system for all-optical networks., , and . GLOBECOM, page 1531-1535. IEEE, (2001)A method for assessing the success and failure of community-level interventions in the presence of network diffusion, social reinforcement, and related social effects., , , , , and . CoRR, (2018)Ethics of AI: A Systematic Literature Review of Principles and Challenges., , , , , , , , and . EASE, page 383-392. ACM, (2022)Optimizing agent placement for flow reconstruction of DDoS attacks., , , and . IWCMC, page 83-89. IEEE, (2013)Using connection expansion to reduce control traffic in MANETs., , and . IWCMC, page 534-538. ACM, (2010)Security Analysis of Firewall Rule Sets in Computer Networks., , , and . SECURWARE, page 51-56. IEEE Computer Society, (2010)Hiding Your Wares: Transparently Retrofitting Memory Confidentiality into Legacy Applications., and . ICC, page 1368-1372. IEEE, (2007)