Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovery of BGP MPLS VPNs., , and . DSOM, volume 3775 of Lecture Notes in Computer Science, page 193-205. Springer, (2005)Redefining passive in backscattering with commodity devices., , , , and . MobiCom, page 3:1-3:13. ACM, (2020)Computing Threshold Times for k-Resilient Protocols., , and . ICPP (2), page 24-27. CRC Press, (1992)Fairness in dead-reckoning based distributed multi-player games., , , and . NETGAMES, page 1-10. ACM, (2005)A Robust Distributed Mutual Exclusion Algorithm., and . WDAG, volume 579 of Lecture Notes in Computer Science, page 295-308. Springer, (1991)Radio Access Network sharing in cellular networks., , , and . ICNP, page 1-10. IEEE Computer Society, (2013)Session level techniques for improving web browsing performance on wireless links., , and . WWW, page 121-130. ACM, (2004)User Identity Based Session Redirection in CDMA2000 Networks., , , and . MobiQuitous, page 105-110. IEEE Computer Society, (2004)Exploiting hybrid channel information for downlink multi-user MIMO scheduling., , and . WiOpt, page 296-303. IEEE, (2013)Probabilistic Diagnosis Algorithms Tailored to System Topology., and . FTCS, page 230-239. IEEE Computer Society, (1991)