Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Making Eigenvector-Based Reputation Systems Robust to Collusion., , , , and . WAW, volume 3243 of Lecture Notes in Computer Science, page 92-104. Springer, (2004)Minimizing recovery overhead in geographic ad hoc routing., , and . Comput. Commun., 33 (11): 1343-1353 (2010)DBit: Assessing statistically significant differences in CDN performance., , , and . Comput. Networks, (2016)Reinforcement learning based routing for time-aware shaper scheduling in time-sensitive networks., , , , and . Comput. Networks, (November 2023)Editorial: Reviewer Appreciation Program., and . IEEE Trans. Mob. Comput., 12 (8): 1469 (2013)Editorial: A Message from the Outgoing Editor-in-Chief and Associate Editor-in-Chief., and . IEEE Trans. Mob. Comput., 13 (1): 1 (2014)Scalable and practical pursuit-evasion with networked robots., , and . Intelligent Service Robotics, 2 (4): 247-263 (2009)Context adaptive thresholding and entropy coding for very low complexity JPEG transcoding., , , , and . ICASSP, page 1392-1396. IEEE, (2016)Declarative failure recovery for sensor networks., , , and . AOSD, volume 208 of ACM International Conference Proceeding Series, page 173-184. ACM, (2007)AdReveal: improving transparency into online targeted advertising., , , , and . HotNets, page 12:1-12:7. ACM, (2013)