Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Necessary and sufficient condition for k crosstalk attacks localization in all-optical networks., and . GLOBECOM, page 2541-2546. IEEE, (2003)All-Optical LAN Interconnection with a Wavelength Selective Router., and . INFOCOM, page 1278-1285. IEEE Computer Society, (1997)Fast recovery from database/link failures in mobile networks., , and . Comput. Commun., 23 (5-6): 561-574 (2000)A reconfigurable multifunction computing cache architecture., , and . IEEE Trans. Very Large Scale Integr. Syst., 9 (4): 509-523 (2001)Efficient overloading techniques for primary-backup scheduling in real-time systems., , and . J. Parallel Distributed Comput., 64 (5): 629-648 (2004)2D and 3D Optimal Parallel Image Warping., and . J. Parallel Distributed Comput., 25 (2): 197-208 (1995)CompuP2P: A light-weight architecture for internet computing., , and . BROADNETS, page 931-940. IEEE, (2005)Energy Minimization through Network Coding for Lifetime Constrained Wireless Networks., , , and . ICCCN, page 471-476. IEEE, (2008)A Comparative Study of Path Level Traffic Grooming Strategies for WDM Optical Networks with Dynamic Traffic - Invited Paper., and . ICCCN, page 267-272. IEEE, (2008)Low Overhead Multiprocessor Allocation Strategies Exploiting System Space Capacity for Fault Detection and Location., , and . IEEE Trans. Computers, 44 (7): 865-877 (1995)Correction: IEEE Transactions on Computers 44(9): 1167 (1995).