Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Cache Timeout for Identifier-to-Locator Mappings with Handovers., , and . IEEE Trans. Network and Service Management, 10 (2): 204-217 (2013)On the applicability of software defined networking to large scale networks., , , , and . ICCCN, page 1-6. IEEE, (2014)A Gini Impurity-Based Interest Flooding Attack Defence Mechanism in NDN., , and . IEEE Communications Letters, 22 (3): 538-541 (2018)The Performance Analysis of the Multicast Extension Support for Proxy MIPv6., , , , and . Wireless Personal Communications, 61 (4): 657-677 (2011)NLBA: A novel provider mobility support approach in mobile NDN environment., , and . CCNC, page 188-193. IEEE, (2014)A network-based mobility management scheme for future Internet., , , , and . Comput. Electr. Eng., 36 (2): 291-302 (2010)Insights for Segment Protection in Survivable WDM Mesh Networks with SRLG Constraints., , and . GLOBECOM, IEEE, (2006)A DHT-Based Identifier-to-Locator Mapping Approach for a Scalable Internet., , and . IEEE Trans. Parallel Distributed Syst., 20 (12): 1790-1802 (2009)A hybrid protection strategy based on node-disjointness against double failures in optical mesh networks., , , , and . Photonic Netw. Commun., 22 (1): 13-22 (2011)CoLoR: an information-centric internet architecture for innovations., , , , , and . IEEE Netw., 28 (3): 4-10 (2014)