Author of the publication

Constrained Diameter Steiner Trees for Multicast Conferences in Overlay Networks.

, , , and . QSHINE, page 262-271. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Scheduling of Hyperperiodic Tasks., and . RTS, page 112-117. IEEE, (1993)A Calculus for Protocol Specification and Validation., , and . Protocol Specification, Testing, and Verification, page 19-34. North-Holland, (1983)A new file transfer protocol., , and . AT&T Tech. J., 64 (10): 2387-2411 (1985)An interference-robust receiver for ultra-wideband radio in SiGe BiCMOS technology., , , , , , , , , and . IEEE J. Solid State Circuits, 40 (12): 2563-2572 (2005)Next Gen PCFG Password Cracking., , and . IEEE Trans. Inf. Forensics Secur., 10 (8): 1776-1791 (2015)Analysis of iOS SQLite Schema Evolution for Updating Forensic Data Extraction Tools., , , and . ISDFS, page 1-7. IEEE, (2020)Authority assignment in distributed multi-player proxy-based games., , , and . NETGAMES, page 5. ACM, (2006)An Empirical Study on Efficiency of a Dictionary Based Viterbi Algorithm for Word Segmentation., , , and . IEEE BigData, page 3702-3710. IEEE, (2020)Adding Liveness Properties to Coupled Finite-State Machines., , and . ACM Trans. Program. Lang. Syst., 12 (2): 303-339 (1990)Supporting and Motivating Re-integration of Justice-Involved Individuals Through Dynamic Gamification., , , , , , , and . HCI (4), volume 14014 of Lecture Notes in Computer Science, page 258-275. Springer, (2023)