Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survival approach for network performance analysis., and . ICWI, page 893-896. IADIS, (2004)Performance modelling and evaluation of telecommunication systems., , , and . Simul. Model. Pract. Theory, 17 (3): 485-486 (2009)Discrete-time heavy-tailed chains, and their properties in modeling network traffic., , and . ACM Trans. Model. Comput. Simul., 17 (4): 17 (2007)A comparative study of congestion control algorithms in IPv6 Wireless Sensor Networks., , , and . DCOSS, page 1-6. IEEE Computer Society, (2011)Mitigating cyber threats at the network edge., , and . IMC, page 776-777. ACM, (2022)Bounding Queuing Delay in a Router Based on Superposition of N MMBP Arrival Process., , , , , and . ICCCN, page 1-6. IEEE Computer Society, (2009)RED and WRED Performance Analysis Based on Superposition of N MMBP Arrival Proccess., , , , , and . AINA, page 66-73. IEEE Computer Society, (2010)A CSP based ontology for a smart home., , and . ICWI, page 973-976. IADIS, (2004)Adaptive Intelligent Middleware Architecture for Mobile Real-Time Communications., , and . IEEE Trans. Mob. Comput., 15 (3): 572-585 (2016)CADC: Congestion Aware Duty Cycle mechanism a simulation evaluation., , , and . CAMAD, page 340-344. IEEE, (2014)