Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CLID: A general approach to validate security policies in a dynamic network., , and . Integrated Network Management, page 1-10. IEEE, (2007)Using Multiple Access Broadcast Network Algorithms for CRCW PRAM Simulations., , and . Parallel and Distributed Computing and Systems, page 411-415. IASTED/ACTA Press, (1995)Analyzing and characterizing small-world graphs., and . SODA, page 311-320. SIAM, (2005)Flexible Scheduling of Multicast Sessions with Different Granularities for Large Data Distribution over WDM Networks., , , and . GLOBECOM, page 1-6. IEEE, (2009)A Fast Algorithm for the Generalized Parametric Minimum Cut Problem and Applications., and . Algorithmica, 7 (5&6): 499-519 (1992)Randomized Competitive Algorithms for Successful and Unsuccessful Search on Self-adjusting Linear Lists., and . ISAAC, volume 762 of Lecture Notes in Computer Science, page 426-435. Springer, (1993)The Complexity of Selection Resolution, Conflict Resolution and Maximum Finding on Multiple Access Channels., and . AWOC, volume 319 of Lecture Notes in Computer Science, page 401-410. Springer, (1988)A comparison of phase and nonphase network flow algorithms.. Networks, 19 (6): 691-705 (1989)Free Performance and Fault Tolerance: Using System Idle Capacity Efficiently (Panel)., , , , and . SIGMETRICS, page 60-61. ACM, (1995)Authentic Third-party Data Publication., , , and . DBSec, volume 201 of IFIP Conference Proceedings, page 101-112. Kluwer, (2000)