Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding lookup performance deficiencies in the KAD network., , and . CollaborateCom, page 462-470. ICST / IEEE, (2012)May the Best Meme Win!: New Exploration of Competitive Epidemic Spreading over Arbitrary Multi-Layer Networks., and . CoRR, (2013)Elasticity and Viral Conductance: Unveiling Robustness in Complex Networks through Topological Characteristics, , , , and . CoRR, (2008)Optimal Network-Based Intervention in the Presence of Undetectable Viruses., and . IEEE Communications Letters, 18 (8): 1347-1350 (2014)Modeling and Forecasting Secondary User Activity in Cognitive Radio Networks., , and . ICCCN, page 179-184. IEEE, (2008)Threshold-based policy for LSP and lightpath setup in GMPLS networks., and . ICC, page 1927-1931. IEEE, (2004)A convex framework for optimal investment on disease awareness in social networks., , and . GlobalSIP, page 851-854. IEEE, (2013)Generalized network measures based on modulus of families of walks., , , and . J. Comput. Appl. Math., (2016)A novel method for QoS provisioning with protection in GMPLS networks., and . Comput. Commun., 29 (6): 757-764 (2006)A new scheme for traffic estimation and resource allocation for bandwidth brokers., , and . Comput. Networks, 41 (6): 761-777 (2003)