Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Analysis of Spatially Constrained Power of Two Choice Policies., , , , and . CoRR, (2020)Matching through Embedding in Dense Graphs., , and . CoRR, (2020)Efficiently Estimating Subgraph Statistics of Large Networks in the Dark., , , , , and . CoRR, (2013)Design of Efficient Sampling Methods on Hybrid Social-Affiliation Networks., , , , and . CoRR, (2014)Optimal scheduling in a machine with stochastic varying processing rate., and . IEEE Trans. Autom. Control., 39 (9): 1853-1855 (1994)An adaptive directional MAC protocol for ad hoc networks using directional antennas., , , and . Sci. China Inf. Sci., 55 (6): 1360-1371 (2012)A Necessary and Sufficient Condition for Throughput Scalability of Fork and Join Networks with Blocking., , , and . SIGMETRICS, page 25-36. ACM, (2016)The Online Knapsack Problem with Departures., , , , , , and . SIGMETRICS (Abstracts), page 59-60. ACM, (2023)Scalable Multipartite Entanglement Distribution in Quantum Networks., , , , and . QCE, page 391-392. IEEE, (2023)An Extremely Lightweight Approach for DDoS Detection at Home Gateways., , , , , and . IEEE BigData, page 5012-5021. IEEE, (2019)