From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Beyond the limits: Maximization of ICN caching capabilities with global detour algorithm., , и . ISCC, стр. 846-853. IEEE Computer Society, (2015)Hi3: An efficient and secure networking architecture for mobile hosts, , , и . Comput. Commun., 31 (10): 2457--2467 (2008)Tolerating path heterogeneity in multipath TCP with bounded receive buffers., , , , и . SIGMETRICS, стр. 375-376. ACM, (2013)DISPUTE: Distributed puzzle tussle., , и . ISCC, стр. 775-778. IEEE Computer Society, (2011)Towards disruption tolerant ICN., , , и . ISCC, стр. 212-219. IEEE Computer Society, (2015)Efficient new delayed ACK for TCP: old problem, new insight., , , и . MSWiM, стр. 355-364. ACM, (2013)Multi-user resource-sharing problem for the Internet.. University of Helsinki, Finland, (2010)base-search.net (ftunivhelsihelda:oai:helda.helsinki.fi:10138/21353).Efficient cache availability management in Information-Centric Networks., , и . Comput. Networks, (2015)Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles., , и . NordSec, том 7127 из Lecture Notes in Computer Science, стр. 33-48. Springer, (2010)On the Optimality and the Stability of Backoff Protocols.. NEW2AN, том 4712 из Lecture Notes in Computer Science, стр. 393-408. Springer, (2007)