Author of the publication

Dynamic Online Routing Algorithm for MPLS Traffic Engineering.

, , and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 936-946. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Power and Spectrum Efficient Uplink Transmission Scheme for QoS-Constrained IoT Networks., , , , and . IEEE Internet Things J., 9 (18): 17425-17439 (2022)An Enhanced Emotion Recognition Algorithm Using Pitch Correlogram, Deep Sparse Matrix Representation and Random Forest Classifier., , , and . IEEE Access, (2021)A Trust and Reputation System for IoT Service Interactions., , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2987-3005 (2022)A State-of-the-Art Review of Cloud Forensics., , and . J. Digit. Forensics Secur. Law, 9 (4): 7-28 (2014)An Empirical Evaluation for Feature Selection Methods in Phishing Email Classification., , and . Comput. Syst. Sci. Eng., (2013)Grid-Controlled Lightpaths for High Performance Grid Applications., , , , and . J. Grid Comput., 1 (4): 387-394 (2003)A Slightly-modified GI-based Author-verifier with Lots of Features (ASGALF)., and . CLEF (Working Notes), volume 1180 of CEUR Workshop Proceedings, page 977-983. CEUR-WS.org, (2014)Phishing Detection: A Literature Survey., , and . IEEE Commun. Surv. Tutorials, 15 (4): 2091-2121 (2013)Gateway Placement Optimization in Wireless Mesh Networks With QoS Constraints., , , and . IEEE J. Sel. Areas Commun., 24 (11): 2127-2136 (2006)Lexical URL analysis for discriminating phishing and legitimate websites., , and . CEAS, page 109-115. ACM, (2011)