Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest editorial - Delay and disruption tolerant wireless communication., , , , , and . IEEE J. Sel. Areas Commun., 26 (5): 745-747 (2008)Application-Layer Multicast., and . Peer-to-Peer Systems and Applications, volume 3485 of Lecture Notes in Computer Science, Springer, (2005)On the Relevance of Social Information to Opportunistic Forwarding., , and . MASCOTS, page 141-150. IEEE Computer Society, (2010)Traffic shaping in wireless home networks., , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 14 (4): 52-54 (2010)Future internet research and experimentation: the FIRE initiative., , , , and . Comput. Commun. Rev., 37 (3): 89-92 (2007)Analytic Evaluation of RED Performance., , and . INFOCOM, page 1415-1424. IEEE Computer Society, (2000)Large-scale vulnerability analysis., , , and . LSAD@SIGCOMM, page 131-138. ACM, (2006)Distributed and Optimal Congestion Control for Application-Layer Multicast: A Synchronous Dual Algorithm., , and . CCNC, page 279-283. IEEE, (2008)End-to-end vs. hop-by-hop transport., , and . SIGMETRICS Perform. Evaluation Rev., 35 (3): 59-60 (2007)From opportunistic networks to opportunistic computing., , , and . IEEE Commun. Mag., 48 (9): 126-139 (2010)