Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Data Collected by Endpoint Detection and Response Systems for Implementation of a Network Security System based on Zero Trust Principles and the EigenTrust Algorithm., , and . SIGMETRICS Perform. Evaluation Rev., 50 (4): 5-7 (April 2023)Influencing Bandits: Arm Selection for Preference Shaping., , and . CoRR, (2024)A Review of Current Operating Systems for Wireless Sensor Networks.. CATA, page 387-394. ISCA, (2007)On the k-coverage of line segments by a non homogeneous Poisson-Boolean model., , and . WiOpt, page 1-6. IEEE, (2009)On the coverage process of a moving target in a dynamic nonstationary sensor field., and . WiOpt, page 491-497. IEEE, (2008)Variable Length Packet Switches: Input Queued Fabrics with Finite Buffers, Speedup, and Parallelism., and . HiPC, volume 2228 of Lecture Notes in Computer Science, page 372-384. Springer, (2001)On load balancing equilibria in multiqueue systems with multiclass traffic., and . NetGCoop, page 1-5. IEEE, (2011)Implementation of WFQ in a distributed open software router., , and . LCN, page 519-527. IEEE Computer Society, (2011)A learning scheme for stationary probabilities of large markov chains with examples., , , and . Allerton, page 1097-1099. IEEE, (2008)On the Path Coverage by a Non Homogeneous Sensor Field., , and . GLOBECOM, IEEE, (2006)