Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A constrained version of a clustering algorithm for switch placement and interconnection in large networks., and . CAINE, page 252-257. ISCA, (2006)A note on the distribution of packet arrivals in high-speed data networks., , , and . ICWI, page 889-892. IADIS, (2004)Principles of Eliminating Access Control Lists within a Domain., , and . Future Internet, 4 (2): 413-429 (2012)The Easyline+ project: evaluation of a user interface developed to enhance independent living of elderly and disabled people., , , , , and . Univers. Access Inf. Soc., 11 (2): 99-112 (2012)An argument for simple embedded ACL optimisation., , and . Comput. Commun., 30 (2): 280-287 (2007)A Case Study Using a Methodological Approach to Developing User Interfaces for Elderly and Disabled People., , , , , , and . Comput. J., 53 (6): 842-859 (2010)A Sample of Consumer Wi-Fi Use & Security in the UK., , and . CNSR, page 386-390. IEEE Computer Society, (2009)No More Privacy Any More?. Inf., 10 (1): 19 (2019)A generalization of the Buckley-Osthus model for web graphs., , , and . Discret. Math., (2014)Improving the Performance of IP Filtering using a Hybrid Approach to ACLs., , and . INC, page 85-95. University of Plymouth, (2010)