Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hi3: An efficient and secure networking architecture for mobile hosts., , , and . Comput. Commun., 31 (10): 2457-2467 (2008)Beyond the limits: Maximization of ICN caching capabilities with global detour algorithm., , and . ISCC, page 846-853. IEEE Computer Society, (2015)Tolerating path heterogeneity in multipath TCP with bounded receive buffers., , , , and . SIGMETRICS, page 375-376. ACM, (2013)Towards disruption tolerant ICN., , , and . ISCC, page 212-219. IEEE Computer Society, (2015)DISPUTE: Distributed puzzle tussle., , and . ISCC, page 775-778. IEEE Computer Society, (2011)An Adaptive Backoff Protocol with Markovian Contention Window Control., , and . Communications in Statistics - Simulation and Computation, 41 (7): 1093-1106 (2012)CIDOR: Content Distribution and Retrieval in Disaster Networks for Public Protection., , , , and . CoRR, (2018)Efficient cache availability management in Information-Centric Networks., , and . Comput. Networks, (2015)Multi-user resource-sharing problem for the Internet.. University of Helsinki, Finland, (2010)base-search.net (ftunivhelsihelda:oai:helda.helsinki.fi:10138/21353).Efficient new delayed ACK for TCP: old problem, new insight., , , and . MSWiM, page 355-364. ACM, (2013)