Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximum Damage Malware Attack in Mobile Wireless Networks., , and . IEEE/ACM Trans. Netw., 20 (5): 1347-1360 (2012)Competitive routing in networks with polynomial costs., , , and . IEEE Trans. Automat. Contr., 47 (1): 92-96 (2002)A dynamic random access game with energy constraints., , , and . WiOpt, page 1-7. IEEE, (2009)Dynamiques des popularités dans YouTube., , , , , and . CORIA, page 39-54. ARIA, (2015)Correlated evolutionarily stable strategies in random medium access control., , , and . GAMENETS, page 212-221. IEEE, (2009)A self-optimization method for coverage-capacity optimization in OFDMA networks with MIMO., , and . VALUETOOLS, page 37-46. ICST/ACM, (2011)Performance Bounds and Pathwise Stability for Generalized Vacation and Polling Systems., , , and . Operations Research, 46 (1): 137-148 (1998)Individual Equilibrium and Learning in Processor Sharing Systems., and . Operations Research, 46 (6): 776-784 (1998)Multimodularity, Convexity, and Optimization Properties., , and . Math. Oper. Res., 25 (2): 324-347 (2000)Improving the Stability Characteristics of Asynchronous Traffic in FDDI Token Ring., and . Data Communication Networks and their Performance, volume C-21 of IFIP Transactions, page 441-460. North-Holland, (1993)