Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of Dynamic Lightpath Configuration for WDM Asymmetric Ring Networks., and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 972-983. Springer, (2002)Practical Time-Scale Fitting of Self-Similar Traffic with Markov-Modulated Poisson Process., , and . Telecommun. Syst., 17 (1-2): 185-211 (2001)Automatic Evacuation Guiding Scheme Using Trajectories of Mobile Nodes., , , and . MobiWIS, volume 9228 of Lecture Notes in Computer Science, page 3-14. Springer, (2015)Efficient construction of binary decision diagrams for network reliability with imperfect vertices., , , and . Reliab. Eng. Syst. Saf., (2019)Capacitated Refuge Assignment for Speedy and Reliable Evacuation., , , and . ISPRS Int. J. Geo Inf., 9 (7): 442 (2020)Resource-Efficient and Availability-Aware Service Chaining and VNF Placement with VNF Diversity and Redundancy., , , and . IEICE Trans. Commun., 107 (1): 105-116 (January 2024)Performance Modeling of Bitcoin Blockchain: Mining Mechanism and Transaction-Confirmation Process.. IEICE Trans. Commun., 104-B (12): 1455-1464 (2021)Enumerating Graph Partitions Without Too Small Connected Components Using Zero-suppressed Binary and Ternary Decision Diagrams., , and . CoRR, (2018)Intelligent Mining Pool Selection in the Case of Unobservable Block Withholding Attack., , , and . IEEE ICBC, page 1-4. IEEE, (2021)Cost-Efficient Anonymous Authentication Scheme Based on Set-Membership Zero-Knowledge Proof., and . BRAINS, page 1-8. IEEE, (2023)