Author of the publication

Topology-Aware Multiple Routing Configurations for Fault Tolerant Networking.

, , and . J. Netw. Syst. Manag., 24 (4): 944-973 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Topology-Aware Multiple Routing Configurations for Fault Tolerant Networking., , and . J. Netw. Syst. Manag., 24 (4): 944-973 (2016)LBP-DCT Based Copy Move Forgery Detection Algorithm., , , , and . ISCIS, volume 363 of Lecture Notes in Electrical Engineering, page 127-136. Springer, (2015)Speaker identification with vector quantization and k-harmonic means., and . SIU, page 2134-2137. IEEE, (2014)DCT based image watermarking method with dynamic gain., , and . TSP, page 550-554. IEEE, (2015)Improved Secret Image Sharing Method By Encoding Shared Values With Authentication Bits., , and . ISCIS, page 331-335. Springer, (2011)Frame duplication detection based on BoW model., , , and . Multim. Syst., 24 (5): 549-567 (2018)Frame duplication/mirroring detection method with binary features., , , and . IET Image Process., 11 (5): 333-342 (2017)Enhancing Multiple Routing Configurations through systematic analysis of topological characteristics., , and . Int. J. Netw. Manag., 26 (3): 176-198 (2016)Image forgery detection based on energy probability., , , and . SIU, page 919-922. IEEE, (2015)Performance evaluation of Multiple Routing Configurations., , and . SIU, page 1-4. IEEE, (2013)