Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Detection of Distributed Constraint Violations., , , and . COMAD, page 230-239. Tata McGraw-Hill Publishing Company Limited, (2006)Extending the Birkhoff-von Neumann switching strategy for multicast - On the use of optical splitting in switches., , and . IEEE J. Sel. Areas Commun., 25 (S-6): 36-50 (2007)WiMAX relay networks: opportunistic scheduling to exploit multiuser diversity and frequency selectivity., , and . MobiCom, page 163-174. ACM, (2008)Algorithms for Enhanced Inter Cell Interference Coordination (eICIC) in LTE HetNets, , , and . CoRR, (2013)Learning Latent Events from Network Message Logs: A Decomposition Based Approach., , , and . CoRR, (2018)Congestion control for fair resource allocation in networks with multicast flows., and . CDC, page 1911-1916. IEEE, (2001)An improved DNS server selection algorithm for faster lookups., , and . COMSWARE, page 288-295. IEEE, (2008)Congestion control for fair resource allocation in networks with multicast flows., and . IEEE/ACM Trans. Netw., 12 (2): 274-285 (2004)Global stability of congestion controllers for the Internet., and . IEEE Trans. Automat. Contr., 48 (6): 1055-1060 (2003)Rate-based versus queue-based models of congestion control., and . IEEE Trans. Automat. Contr., 51 (4): 606-619 (2006)