Author of the publication

Flow scheduling protocols without real-time clocks.

, , and . ISCC, page 596-600. IEEE Computer Society, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Brief announcement: the theory of network tracing., and . PODC, page 318-319. ACM, (2009)Truth in advertising: lightweight verification of route integrity., , , , and . PODC, page 147-156. ACM, (2007)Secret instantiation in ad-hoc networks., , and . Comput. Commun., 29 (2): 200-215 (2006)Convergence of Iteration Systems., , , and . Distributed Comput., 7 (1): 43-53 (1993)Maintaining Digital Clocks in Step., , and . Parallel Process. Lett., (1991)Logarithmic keying., , and . ACM Trans. Auton. Adapt. Syst., 3 (4): 18:1-18:18 (2008)On Constructing Multi-Phase Communication Protocols., , and . PSTV, page 57-68. North-Holland, (1984)Deadlock Detection for a Class of Communicating Finite State Machine., and . PSTV, page 319. North-Holland, (1982)The Two-Dimensional Window Protocol.. PSTV, volume C-8 of IFIP Transactions, page 365-379. North-Holland, (1992)Elements of security: Closure, convergence, and protection.. Inf. Process. Lett., 77 (2-4): 109-114 (2001)