Author of the publication

Internet resiliency to attacks and failures under BGP policy routing.

, , , and . Comput. Networks, 50 (16): 3183-3196 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison of Measurement-Based Call Admission Control Algorithms for Controlled-Load Service., , and . INFOCOM, page 973-980. IEEE Computer Society, (1997)To Peer or Not to Peer: Modeling the Evolution of the Internet's AS-Level Topology., , and . INFOCOM, IEEE, (2006)Towards capturing representative AS-level Internet topologies., , , , and . Comput. Networks, 44 (6): 737-755 (2004)Differentiated Services with Lottery Queueing., and . IWQoS, volume 2092 of Lecture Notes in Computer Science, page 357-371. Springer, (2001)End-Host Multicast Communication Using Switch-Trees Protocols., and . CCGRID, page 419-424. IEEE Computer Society, (2002)Characterizing guarded hosts in peer-to-peer file sharing systems., , , and . GLOBECOM, page 1539-1543. IEEE, (2004)An efficient synchronization mechanism for mirrored game architectures., , , and . NETGAMES, page 67-73. ACM, (2002)An Empirical Approach to Modeling Inter-AS Traffic Matrices., , , and . Internet Measurement Conference, page 139-152. USENIX Association, (2005)CLF: An Online Coflow-Aware Packet Scheduling Algorithm., , and . LCN, page 648-656. IEEE, (2018)Does AS size determine degree in as topology?, , , , , and . Comput. Commun. Rev., 31 (5): 7-8 (2001)