Author of the publication

Computing the unmeasured: an algebraic approach to Internet mapping.

, , , and . IEEE J. Sel. Areas Commun., 22 (1): 67-78 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks., and . ESORICS, volume 3193 of Lecture Notes in Computer Science, page 293-308. Springer, (2004)Modeling and detection of complex attacks., and . SecureComm, page 234-243. IEEE, (2007)Environmental Authentication in Malware., , , and . LATINCRYPT, volume 11368 of Lecture Notes in Computer Science, page 381-400. Springer, (2017)Robust key generation from signal envelopes in wireless networks., , , and . ACM Conference on Computer and Communications Security, page 401-410. ACM, (2007)Joint problem of power optimal connectivity and coverage in wireless sensor networks., , and . Wireless Networks, 13 (4): 537-550 (2007)Time synchronization in sensor networks: a survey., and . IEEE Network, 18 (4): 45-50 (2004)Unsupervised Multiway Data Analysis: A Literature Survey., and . IEEE Trans. Knowl. Data Eng., 21 (1): 6-20 (2009)Cell-graph modeling of salivary gland morphology., , , , , , and . ISBI, page 1427-1430. IEEE, (2010)Contention-Free MAC Protocols for Wireless Sensor Networks., , , and . DISC, volume 3274 of Lecture Notes in Computer Science, page 245-259. Springer, (2004)Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information., , , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 297-306. Springer, (2004)