Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal propagation of security patches in mobile wireless networks: extended abstract., , and . SIGMETRICS, page 355-356. ACM, (2010)Core-concavity, Gain Functions and Axioms for Information Leakage., , and . The Art of Modelling Computational Systems, volume 11760 of Lecture Notes in Computer Science, page 261-275. Springer, (2019)Optimal routing and scheduling in wireless networks with nodes powered by renewable and traditional energy sources., , and . BlackSeaCom, page 186-190. IEEE, (2013)Channel Ordering and Supermodularity., , and . ITW, page 1-5. IEEE, (2019)An economic analysis of regulating security investments in the Internet., , and . INFOCOM, page 818-826. IEEE, (2013)Managing the adoption of asymmetric bidirectional firewalls: Seeding and mandating., , and . GLOBECOM, page 911-916. IEEE, (2012)Optimal control of epidemic evolution., , and . INFOCOM, page 1683-1691. IEEE, (2011)Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks., , and . CDC, page 2354-2359. IEEE, (2010)Optimal Quarantining of Wireless Malware Through Reception Gain Control., , and . IEEE Trans. Automat. Contr., 57 (1): 49-61 (2012)A fair scheduling policy for wireless channels with intermittent connectivity., , , and . CISS, page 503-508. IEEE, (2008)