Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid Tree Reconstruction Methods., , , , and . ACM Journal of Experimental Algorithmics, (1999)Obtaining highly accurate topology estimates of evolutionary trees from very short sequences., , and . RECOMB, page 198-207. ACM, (1999)Balancing the hidden and exposed node problems with power control in CSMA/CA-based wireless networks., and . WCNC, page 683-688. IEEE, (2005)Transactions in a Flash., and . POS/PJW, page 2-16. Morgan Kaufmann, (1998)A Software Architecture for Cross-Layer Wireless Network Adaptations., , and . WICSA, page 281-284. IEEE Computer Society, (2008)Replication-Based Incremental Copying Collection., , and . IWMM, volume 637 of Lecture Notes in Computer Science, page 357-364. Springer, (1992)Using Active Networking's Adaptability in Ad Hoc Routing., and . IWAN, volume 3912 of Lecture Notes in Computer Science, page 138-155. Springer, (2004)Improving throughput and fairness for MIMO ad hoc networks using antenna selection diversity., , and . GLOBECOM, page 3363-3367. IEEE, (2004)Active Networking: One View of the Past, Present, and Future., and . IEEE Trans. Syst. Man Cybern. Part C, 34 (1): 4-18 (2004)On MAC-layer denial of service attacks in IEEE 802.11 ad hoc networks: analysis and counter measures., , and . Int. J. Wirel. Mob. Comput., 1 (3/4): 268-275 (2006)