Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A binary feedback scheme for congestion avoidance in computer networks with a connectionless network layer., and . Comput. Commun. Rev., 25 (1): 138-156 (1995)Machine Learning at the Edge: Efficient Utilization of Limited CPU/GPU Resources by Multiplexing., , and . ICNP, page 1-6. IEEE, (2020)A Resource Allocation Policy Using Time Thresholding., and . Performance, page 395-413. North-Holland, (1983)A Transport Protocol to Exploit Multipath Diversity in Wireless Networks., , , and . IEEE/ACM Trans. Netw., 20 (4): 1024-1039 (2012)Performance Analysis of Mass Storage Service Alternatives for Distributed Systems., and . IEEE Trans. Software Eng., 15 (2): 120-133 (1989)Hybrid Packet FEC and Retransmission-based Erasure Recovery Mechanisms for Lossy Networks: Analysis and Design., , and . COMSWARE, IEEE, (2007)Performance benefits of non-volatile caches in distributed file systems., , , and . Concurr. Pract. Exp., 6 (4): 289-323 (1994)A Formal Specification of the ATM ABR Rate Control Scheme., , and . Comput. Networks, 30 (19): 1735-1748 (1998)CleanG - Improving the Architecture and Protocols for Future Cellular Networks With NFV., , and . IEEE/ACM Trans. Netw., 28 (6): 2559-2572 (2020)REINFORCE: Achieving Efficient Failure Resiliency for Network Function Virtualization-Based Services., , , , , and . IEEE/ACM Trans. Netw., 28 (2): 695-708 (2020)