Author of the publication

A design for securing data delivery in mesh-based peer-to-peer streaming.

, , , and . Comput. Networks, 55 (12): 2730-2745 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The critical isotherm of the modified F model, and . Physica A: Statistical and Theoretical Physics, 106 (1-2): 292--300 (March 1981)Extraction of micro-Doppler signal based on the combination of CLEAN and L-statistics method., , , and . IGARSS, page 2707-2710. IEEE, (2016)Computational Complexity of Input/Output Logic., and . MIWAI, volume 9426 of Lecture Notes in Computer Science, page 72-79. Springer, (2015)Deontic STIT logic, from logical paradox to security policy., and . Soft Comput., 22 (3): 751-757 (2018)Conditional Ought, a Game Theoretical Perspective.. LORI, volume 6953 of Lecture Notes in Computer Science, page 356-369. Springer, (2011)Minimizing network complexity through integrated top-down design., and . CoNEXT, page 259-270. ACM, (2013)Robust object tracking via inertial potential based mean shift., , and . ICIMCS, page 178-181. ACM, (2011)Tour into the picture using relative depth calculation., , and . VRCAI, page 38-44. ACM, (2004)STIT Based Deontic Logics for the Miners Puzzle., and . EUMAS, volume 8953 of Lecture Notes in Computer Science, page 236-251. Springer, (2014)Proof Theory, Semantics and Algebra for Normative Systems.. LORI, volume 8196 of Lecture Notes in Computer Science, page 228-238. Springer, (2013)