Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stochastic maintenance of overlays in structured P2P systems., , , , and . Comput. Commun., 31 (3): 603-619 (2008)Chord-zip: a chord-ring merger algorithm., and . IEEE Communications Letters, 12 (8): 605-607 (2008)Self-healing in multi-constrained multi-actor virtualization orchestration., , , , , , and . INFOCOM Workshops, page 1-2. IEEE, (2018)5G Applications From Vision to Reality: Multi-Operator Orchestration., , , , , , , , , and . IEEE J. Sel. Areas Commun., 38 (7): 1401-1416 (2020)The orchestration in 5G exchange - A multi-provider NFV framework for 5G services., , , , , , , , , and 1 other author(s). NFV-SDN, page 1-2. IEEE, (2017)Beat Cepheids as Probes of Stellar and Galactic Metallicity, and . The Astrophysical Journal, 660 (1): 723 (2007)On the Representability of Arbitrary Path Sets as Shortest Paths: Theory, Algorithms, and Complexity., , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 1180-1191. Springer, (2004)Service Specific Information Based Resource Allocation for Multimedia Applications., and . Informatica (Slovenia), (1999)Softwarization of carrier networks., , , and . it - Information Technology, 57 (5): 277-284 (2015)Path integrity aware traffic engineering telecom traffic., , , , and . GLOBECOM, page 692-696. IEEE, (2004)