Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtualization Techniques for Redesigning Mobile Backhaul Networks: Challenges and Issues.. MobiArch, page 1. ACM, (2015)Integration of streaming services and TCP data transmission in the Internet, , , and . CoRR, (2006)Cell Conformance Testing with Respect to the Peak Cell Rate in ATM Networks., , and . Computer Networks and ISDN Systems, 27 (5): 703-725 (1995)A leaky bucket with memory., , and . Broadband Communications, volume C-4 of IFIP Transactions, page 275-285. North-Holland, (1992)Admission control of leaky bucket regulated sources in a queueing system with priority, , and . (2003)Volatility of YouTube content in Orange networks and consequences., , and . ICC, page 2381-2385. IEEE, (2013)Analysis of cell clumping caused by ATM network GFC protocols., and . Comput. Commun., 17 (9): 637-646 (1994)On the capability of the policing function to release an ATM connection., , and . Telecommun. Syst., 2 (1): 239-259 (1993)White Paper on Crowdsourced Network and QoE Measurements - Definitions, Use Cases and Challenges., , , , , , , , , and 6 other author(s). CoRR, (2020)A Basic Requirement for the Policing Function in ATM Networks., and . Computer Networks and ISDN Systems, 24 (4): 311-320 (1992)