Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hi3: An efficient and secure networking architecture for mobile hosts, , , and . Comput. Commun., 31 (10): 2457--2467 (2008)Beyond the limits: Maximization of ICN caching capabilities with global detour algorithm., , and . ISCC, page 846-853. IEEE Computer Society, (2015)NL-Augmenter: A Framework for Task-Sensitive Natural Language Augmentation., , , , , , , , , and 115 other author(s). CoRR, (2021)Tolerating path heterogeneity in multipath TCP with bounded receive buffers., , , , and . SIGMETRICS, page 375-376. ACM, (2013)Towards disruption tolerant ICN., , , and . ISCC, page 212-219. IEEE Computer Society, (2015)DISPUTE: Distributed puzzle tussle., , and . ISCC, page 775-778. IEEE Computer Society, (2011)Multi-user resource-sharing problem for the Internet.. University of Helsinki, Finland, (2010)base-search.net (ftunivhelsihelda:oai:helda.helsinki.fi:10138/21353).Efficient new delayed ACK for TCP: old problem, new insight., , , and . MSWiM, page 355-364. ACM, (2013)Efficient cache availability management in Information-Centric Networks., , and . Comput. Networks, (2015)Location-Price Competition in Mobile Operator Market., , and . IGTR, 21 (3): 1850015:1-1850015:15 (2019)