Author of the publication

Computing distance-bounded node-disjoint paths for all pairs of nodes - An application to optical core network design.

, , , and . RNDM@WMNC, page 71-77. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incidents are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems., , , , and . IEEE Trans. Software Eng., 48 (2): 120-134 (2022)Developing Approaches for Solving a Telecommunications Feature Subscription Problem., , , , and . J. Artif. Intell. Res., (2010)Deployment Strategies for Protected Long-Reach PON., , , , , and . JOCN, 4 (2): 118-129 (2012)A constraint-based parallel local search for the edge-disjoint rooted distance-constrained minimum spanning tree problem., , , and . J. Heuristics, 24 (3): 359-394 (2018)Evolving Instance Specific Algorithm Configuration., , and . SOCS, page 133-140. AAAI Press, (2013)Energy cost minimisation of geographically distributed data centres., , and . CloudNet, page 279-284. IEEE, (2015)A Methodology for Online Consolidation of Tasks through More Accurate Resource Estimations., , , , and . UCC, page 89-98. IEEE Computer Society, (2014)An adaptive large neighbourhood search for designing transparent optical core network., , , and . ConTEL, page 1-8. IEEE, (2015)Medical Insurance Virtual Assistant: Vaidya., and . IC3I, page 584-589. IEEE, (2022)Preferred Explanations for Quantified Constraint Satisfaction Problems., , and . ICTAI (1), page 275-278. IEEE Computer Society, (2010)