From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A classification of location privacy attacks and approaches., , , и . Personal and Ubiquitous Computing, 18 (1): 163-175 (2014)Consistent Network Management for Software-Defined Networking Based Multicast., , и . IEEE Trans. Network and Service Management, 13 (3): 447-461 (2016)Routing algorithms for IEEE802.1Qbv networks., , и . SIGBED Review, 15 (3): 13-18 (2018)Modeling time-triggered service intermittence in network calculus., , и . RTNS, стр. 90-100. ACM, (2019)How to Optimize Joint Routing and Scheduling Models for TSN Using Integer Linear Programming., , , , , и . RTNS, стр. 100-111. ACM, (2021)PShare: Ensuring location privacy in non-trusted systems through multi-secret sharing., , и . Pervasive Mob. Comput., 9 (3): 339-352 (2013)Time-Triggered Traffic Planning for Data Networks with Conflict Graphs., , и . RTAS, стр. 124-136. IEEE, (2020)SimEdge: Towards Accelerated Real-Time Augmented Reality Simulations Using Adaptive Smart Edge Computing., , , и . MSWiM, стр. 181-190. ACM, (2023)Optimal Refinement for Component-based Architectures., , и . EDOC, стр. 142-151. IEEE, (2021)OID: Optimized Information Discovery Using Space Filling Curves in P2P Overlay Networks., , , , , и . ICPADS, стр. 311-319. IEEE Computer Society, (2008)