Author of the publication

Worst-case analysis for deterministic allocation in a differentiated services network.

, , , and . GLOBECOM, page 1554-1559. IEEE, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord., and . Secur. Commun. Networks, (2018)Anomaly Detection of Medical IoT Traffic Using Machine Learning., , , , , and . DATA, page 173-182. SCITEPRESS, (2023)Lightweight multicast forwarding for service discovery in low-power IoT networks., , , , , and . SoftCOM, page 133-138. IEEE, (2014)Byzantine Generals Problem in the Light of P2P Computing., and . MobiQuitous, page 1-5. IEEE Computer Society, (2006)Performance evaluation of a SIP-based constrained peer-to-peer overlay., , , and . HPCS, page 432-435. IEEE, (2014)Roaming Scenarios Based on SIP., and . MMNS, volume 2496 of Lecture Notes in Computer Science, page 302-314. Springer, (2002)mjCoAP: An Open-Source Lightweight Java CoAP Library for Internet of Things Applications., , and . OpenIoT@SoftCOM, volume 9001 of Lecture Notes in Computer Science, page 118-133. Springer, (2014)Explainable Anomaly Detection of Synthetic Medical IoT Traffic Using Machine Learning., , , , , and . SN Comput. Sci., 5 (5): 488 (June 2024)Worst-case analysis for deterministic allocation in a differentiated services network., , , and . GLOBECOM, page 1554-1559. IEEE, (2000)Blocking probability of three-stage multicast switches., and . ICC, page 623-629. IEEE, (1998)