Author of the publication

Demonstrating Voice over an Autonomic Network.

, and . ICAC, page 139-140. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Random Injection Control of Multiprogramming in Virtual Memory., and . Performance, page 143-170. North-Holland, (1976)Single node and end-to-end buffer control in real time., , and . Modelling and Evaluation of ATM Networks, volume 17 of IFIP Conference Proceedings, page 458-473. Chapman & Hall, (1994)A Model of Roll-Back Recovery with Multiple Checkpoints.. ICSE, page 251-255. IEEE Computer Society, (1976)Bandwidth Usage - Based Detection of Signaling Attacks., , and . ISCIS, volume 363 of Lecture Notes in Electrical Engineering, page 105-114. Springer, (2015)Stability of the Random Neural Network Model.. EURASIP Workshop, volume 412 of Lecture Notes in Computer Science, page 56-68. Springer, (1990)Single-cell based random neural network for deep learning., and . IJCNN, page 86-93. IEEE, (2017)Guest Editor's Introduction to the Special Issue on Neural Network Software and Systems.. IEEE Trans. Software Eng., 18 (7): 549-550 (1992)Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach., , , and . ISCIS, volume 264 of Lecture Notes in Electrical Engineering, page 429-438. Springer, (2013)Energy-Aware Admission Control for Wired Networks., , and . ISCIS, volume 264 of Lecture Notes in Electrical Engineering, page 117-125. Springer, (2013)Probabilistic models of computer systems., and . SIGMETRICS, page 118-125. ACM, (1976)