Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Routing amid Colluding Attackers., , and . ICNP, page 184-193. IEEE Computer Society, (2007)Threshold Conditions for Arbitrary Cascade Models on Arbitrary Networks., , , , and . ICDM, page 537-546. IEEE Computer Society, (2011)Routing Scalability in MANETs., , and . Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks, CRC Press / Taylor & Francis, (2005)Understanding Wireless Mobile Systems: A Simplified Simulation Approach., , and . IWDC, volume 2571 of Lecture Notes in Computer Science, page 108-117. Springer, (2002)Understanding the Interactions between Unicast and Group Communications Sessions in Ad Hoc Networks., , and . MWCN, volume 162 of IFIP, page 1-12. Kluwer/Springer, (2004)PhishDef: URL Names Say It All, , and . CoRR, (2010)A Systematic Framework for Unearthing the Missing Links: Measurements and Impact., , , and . NSDI, USENIX, (2007)Fireworks: An Adaptive Group Communications Protocol for Mobile Ad Hoc Networks., , and . NETWORKING, volume 3462 of Lecture Notes in Computer Science, page 853-868. Springer, (2005)Characterizing and Modelling Clustering Features in AS-Level Internet Topology., , , and . INFOCOM, page 271-275. IEEE, (2008)Capacity of Hybrid Cellular-Ad Hoc Data Networks., , and . INFOCOM, page 1606-1614. IEEE, (2008)