Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Balancing the hidden and exposed node problems with power control in CSMA/CA-based wireless networks., and . WCNC, page 683-688. IEEE, (2005)Obtaining highly accurate topology estimates of evolutionary trees from very short sequences., , and . RECOMB, page 198-207. ACM, (1999)Transactions in a Flash., and . POS/PJW, page 2-16. Morgan Kaufmann, (1998)Replication-Based Incremental Copying Collection., , and . IWMM, volume 637 of Lecture Notes in Computer Science, page 357-364. Springer, (1992)A Software Architecture for Cross-Layer Wireless Network Adaptations., , and . WICSA, page 281-284. IEEE Computer Society, (2008)Transactions for Java., and . ICCL, page 16-27. IEEE Computer Society, (1998)Using Active Networking's Adaptability in Ad Hoc Routing., and . IWAN, volume 3912 of Lecture Notes in Computer Science, page 138-155. Springer, (2004)Improving the Performance of SML Garbage Collection Using Application-Specific Virtual Memory Management., , and . LISP and Functional Programming, page 43-52. ACM, (1992)Concurrent Replicating Garbage Collection., and . LISP and Functional Programming, page 34-42. ACM, (1994)Throughput/Delay Measurements of Limited Feedback Beamforming in Indoor Wireless Networks., , , , and . GLOBECOM, page 4593-4598. IEEE, (2008)