Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending Network-Based Services Against Denial of Service Attacks., , and . ICCCN, page 17-22. IEEE, (2006)Multimedia after a decade of research (panel discussion): multimedia after a decade of research.. NOSSDAV, page 103. ACM, (2001)The Role of Multicast Communication in the Provision of Scalable and Interactive Video-On-Demand Service., and . NOSSDAV, volume 1018 of Lecture Notes in Computer Science, page 251-254. Springer, (1995)Friend relay: a resource sharing framework for mobile wireless devices., , and . WMASH, page 20-29. ACM, (2006)Providing Scalable Many-to-One Feedback in Multicast Reachability Monitoring Systems., and . MMNS, volume 2216 of Lecture Notes in Computer Science, page 256-270. Springer, (2001)A Lightweight Content Replication Scheme for Mobile Ad Hoc Environments., , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 125-136. Springer, (2004)SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr., , , , , and . ISC, volume 4176 of Lecture Notes in Computer Science, page 343-358. Springer, (2006)DECAF: A digital classroom application framework., and . Communications, Internet, and Information Technology, page 207-212. IASTED/ACTA Press, (2004)Tracetree: a scalable mechanism to discover multicast tree topologies in the internet., and . IEEE/ACM Trans. Netw., 12 (5): 795-808 (2004)To preempt or not: Tackling bid and time-based cheating in online spectrum auctions., , , and . INFOCOM, page 2219-2227. IEEE, (2011)