Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On anonymity in an electronic society: A survey of anonymous communication systems., and . ACM Comput. Surv., 42 (1): 5:1-5:35 (2009)Prediction of Growth Factor-Dependent Cleft Formation During Branching Morphogenesis Using A Dynamic Graph-Based Growth Model., , , , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 13 (2): 350-364 (2016)Networking security Guest Editorial., and . IEEE Netw., 13 (6): 10-11 (1999)Combinatorial design of congestion-free networks., , and . IEEE/ACM Trans. Netw., 5 (6): 989-1000 (1997)A Combinatorial Approach to Measuring Anonymity., , and . ISI, page 356-363. IEEE, (2007)Analysis of Load-Balanced Switch with Finite Buffers., , , and . GLOBECOM, page 1524-1529. IEEE, (2008)AVLeak: Fingerprinting Antivirus Emulators through Black-Box Testing., , , , and . WOOT, USENIX Association, (2016)Be Appropriate and Funny: Automatic Entity Morph Encoding., , , , , , , , and . ACL (2), page 706-711. The Association for Computer Linguistics, (2014)Provisioning a virtual private network: a network design problem for multicommodity flow., , , , and . STOC, page 389-398. ACM, (2001)Preserving proximity relations and minimizing edge-crossings in high dimensional graph visualizations., , , and . LDAV, page 131-132. IEEE Computer Society, (2011)