Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Basic Requirement for the Policing Function in ATM Networks., and . Computer Networks and ISDN Systems, 24 (4): 311-320 (1992)On pathwise rate conservation for a class of semi-martingales, , , and . Stochastic Processes and their Applications, 47 (1): 119--130 (August 1993)A leaky bucket with memory., , and . Broadband Communications, volume C-4 of IFIP Transactions, page 275-285. North-Holland, (1992)Admission control of leaky bucket regulated sources in a queueing system with priority, , and . (2003)Integration of streaming services and TCP data transmission in the Internet, , , and . CoRR, (2006)Volatility of YouTube content in Orange networks and consequences., , and . ICC, page 2381-2385. IEEE, (2013)Virtualization Techniques for Redesigning Mobile Backhaul Networks: Challenges and Issues.. MobiArch, page 1. ACM, (2015)Analysis of cell clumping caused by ATM network GFC protocols., and . Comput. Commun., 17 (9): 637-646 (1994)IP Traffic Classification via Blind Source Separation Based on Jacobi Algorithm., , and . ECUMN, volume 3262 of Lecture Notes in Computer Science, page 287-296. Springer, (2004)Combustion parameters estimation and control using vibration signal : Application to the Diesel HCCI engine., , , , and . CDC, page 5621-5627. IEEE, (2008)