Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing dynamic adaptive streaming over HTTP for multi-homed users using a Multi-Armed Bandit algorithm., , , and . IWCMC, page 692-697. IEEE, (2019)Point and expected interval availability analysis with stationarity detection., , and . Comput. Oper. Res., 26 (3): 211-218 (1999)Probabilistic Analysis of Rumor-Spreading Time., , and . INFORMS J. Comput., 32 (1): 172-181 (2020)Exact transient solution of an M/M/1 driven fluid queue., , and . Int. J. Comput. Math., 82 (6): 659-671 (2005)Probabilistic analysis of counting protocols in large-scale asynchronous and anonymous systems., , and . NCA, page 315-322. IEEE Computer Society, (2017)A Simple Priority Mechanism for Shared-Protection Schemes., and . IEEE Communications Letters, 11 (2): 197-199 (2007)Interval Availability Analysis Using Denumerable Markov Processes: Application to Multiprocessor Subject to Breakdowns and Repair., and . IEEE Trans. Computers, 44 (2): 286-291 (1995)Comment on "Performability Analysis: A New Algorithm"., , , and . IEEE Trans. Computers, 59 (1): 137-138 (2010)Byzantine-tolerant uniform node sampling service in large-scale networks., , and . Int. J. Parallel Emergent Distributed Syst., 36 (5): 412-439 (2021)Second order fluid models with general boundary behaviour., , , and . Ann. Oper. Res., 160 (1): 69-82 (2008)