From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient and Resilient Backbones for Multihop Wireless Networks., , , и . IEEE Trans. Mob. Comput., 7 (11): 1349-1362 (2008)The Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels., , , , , , , и . Wireless Personal Communications, 96 (1): 1145-1172 (2017)Gold standard auditing for router configurations., , , и . LANMAN, стр. 1-6. IEEE, (2010)Multi-armed Bandit Algorithm against Strategic Replication., , и . CoRR, (2021)3G Meets the Internet: Understanding the performance of hierarchical routing in 3G networks., , и . ITC, стр. 15-22. IEEE, (2011)Proactive Network Management of IPTV Networks., , , , , , , и . INM/WREN, USENIX Association, (2010)WISE Abstraction Framework for Wireless Networks.. University of Maryland, College Park, MD, USA, (2006)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/3867).Robust Routing in Wireless Ad Hoc Networks., , и . ICPP Workshops, стр. 73-78. IEEE Computer Society, (2002)SMOG: A cloud platform for seamless wide area migration of online games., , , , и . NetGames, стр. 1-6. IEEE, (2012)The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack., , , и . ICDCS, стр. 137-144. IEEE Computer Society, (2009)