Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self Adaptive Robust Resource Allocation for Prioritized TCP Flows in Wireless Networks., , , , and . SASO Workshops, page 108-113. IEEE Computer Society, (2015)Polynomial Constraint Satisfaction: A Framework for Counting and Sampling CSPs and Other Problems, and . CoRR, (2006)Security in Active Networks., , , and . Secure Internet Programming, volume 1603 of Lecture Notes in Computer Science, page 433-451. Springer, (1999)The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET., , , , , and . POLICY, page 174-177. IEEE Computer Society, (2009)Judicious partitions and related problems.. BCC, volume 327 of London Mathematical Society Lecture Note Series, page 95-117. Cambridge University Press, (2005)The SwitchWare active network architecture., , , , , , , , and . IEEE Netw., 12 (3): 29-36 (1998)A secure active network environment architecture: realization in SwitchWare., , , and . IEEE Netw., 12 (3): 37-45 (1998)Linear-programming design and analysis of fast algorithms for Max 2-Sat and Max 2-CSP, and . CoRR, (2006)PLANet: An Active Internetwork., , , , and . INFOCOM, page 1124-1133. IEEE Computer Society, (1999)The Architecture of ALIEN., and . IWAN, volume 1653 of Lecture Notes in Computer Science, page 1-12. Springer, (1999)