Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analytic Evaluation of RED Performance., , and . INFOCOM, page 1415-1424. IEEE Computer Society, (2000)Application-Layer Multicast., and . Peer-to-Peer Systems and Applications, volume 3485 of Lecture Notes in Computer Science, Springer, (2005)On the Relevance of Social Information to Opportunistic Forwarding., , and . MASCOTS, page 141-150. IEEE Computer Society, (2010)A System Architecture for Evolving Protocol Stacks (Invited Paper)., , , , , and . ICCCN, page 144-150. IEEE, (2008)A Robust, Responsive, Distributed Tree-Based Routing Algorithm Guaranteeing N Valid Links per Node in Wireless Ad-Hoc Networks., , , and . ISCC, page 455-462. IEEE Computer Society, (2007)Large-scale vulnerability analysis., , , and . LSAD@SIGCOMM, page 131-138. ACM, (2006)Distributed and Optimal Congestion Control for Application-Layer Multicast: A Synchronous Dual Algorithm., , and . CCNC, page 279-283. IEEE, (2008)From opportunistic networks to opportunistic computing., , , and . IEEE Commun. Mag., 48 (9): 126-139 (2010)3d Visualisation in Spatial Data Infrastructures., , and . Smart Graphics, volume 3638 of Lecture Notes in Computer Science, page 222-229. Springer, (2005)Acceleration of neural network model execution on embedded systems., , and . VLSI-DAT, page 1-3. IEEE, (2018)