Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

r3: Resilient Random Regular Graphs., , , , and . DISC, volume 5218 of Lecture Notes in Computer Science, page 137-151. Springer, (2008)Estimating signal strength coverage for a wireless access point., , and . GLOBECOM, page 3264-3269. IEEE, (2004)Performance implications of hosting enterprise telephony applications on virtualized multi-core platforms., , , , and . IPTComm, page 8. ACM, (2009)Load-Based Metrics and Flooding in Wireless Mesh Networks., , , and . WASA, volume 5258 of Lecture Notes in Computer Science, page 84-95. Springer, (2008)MEOW with CATS: multimedia extensions over wireless with CTS-assisted transmission scheme., , and . WCNC, page 145-150. IEEE, (2005)VoIP protection and performance improvement., , and . ICCCN, page 505-510. IEEE, (2003)VoIP network failure detection and user notification., , and . ICCCN, page 511-516. IEEE, (2003)Efficient Search Algorithms in the Presence of Measurement Uncertainty., , , and . ICC, page 360-365. IEEE, (2008)Measurement of Path Redundancy for Protection in Enterprise Networks., , , and . GLOBECOM, IEEE, (2006)Bayesian indoor positioning systems., , , , , and . INFOCOM, page 1217-1227. IEEE, (2005)