Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Performance-Based Scheme for Pricing Resources in the Cloud., , and . CoRR, (2016)On the capacity of multiple unicast sessions in undirected graphs., , , and . ISIT, page 563-567. IEEE, (2005)Greedy Facility Location Algorithms Analyzed using Dual Fitting with Factor-Revealing LP, , , , and . CoRR, (2002)Approximation algorithms for metric facility location and k-Median problems using the primal-dual schema and Lagrangian relaxation., and . J. ACM, 48 (2): 274-296 (2001)Building scalable and robust peer-to-peer overlay networks for broadcasting using network coding., , and . PODC, page 51-59. ACM, (2005)Security based on network topology against the wiretapping attack.. IEEE Wirel. Commun., 11 (1): 68-71 (2004)A unification of network coding and tree-packing (routing) theorems., , and . IEEE Trans. Inf. Theory, 52 (6): 2398-2409 (2006)Signatures for Network Coding, , and . Conference on Information Sciences and Systems, CISS 2006, page 857--863. IEEE, (2006)Equilibria for economies with production: constant-returns technologies and production planning constraints., and . SODA, page 688-697. ACM Press, (2006)Snow Density Retrieval Using Hybrid Polarimetric RISAT-1 Datasets., , , , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2020)