Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Balancing the hidden and exposed node problems with power control in CSMA/CA-based wireless networks., and . WCNC, page 683-688. IEEE, (2005)Obtaining highly accurate topology estimates of evolutionary trees from very short sequences., , and . RECOMB, page 198-207. ACM, (1999)Transactions in a Flash., and . POS/PJW, page 2-16. Morgan Kaufmann, (1998)A Software Architecture for Cross-Layer Wireless Network Adaptations., , and . WICSA, page 281-284. IEEE Computer Society, (2008)Replication-Based Incremental Copying Collection., , and . IWMM, volume 637 of Lecture Notes in Computer Science, page 357-364. Springer, (1992)Using Active Networking's Adaptability in Ad Hoc Routing., and . IWAN, volume 3912 of Lecture Notes in Computer Science, page 138-155. Springer, (2004)Improving throughput and fairness for MIMO ad hoc networks using antenna selection diversity., , and . GLOBECOM, page 3363-3367. IEEE, (2004)Improving the Performance of SML Garbage Collection Using Application-Specific Virtual Memory Management., , and . LISP and Functional Programming, page 43-52. ACM, (1992)Concurrent Replicating Garbage Collection., and . LISP and Functional Programming, page 34-42. ACM, (1994)Transactions for Java., and . ICCL, page 16-27. IEEE Computer Society, (1998)