Author of the publication

Self Adaptive Robust Resource Allocation for Prioritized TCP Flows in Wireless Networks.

, , , , and . SASO Workshops, page 108-113. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Architecture of ALIEN., and . IWAN, volume 1653 of Lecture Notes in Computer Science, page 1-12. Springer, (1999)Computational Complexity of Some Restricted Instances of 3SAT, , and . Electron. Colloquium Comput. Complex., (2004)A secure active network environment architecture: realization in SwitchWare., , , and . IEEE Netw., 12 (3): 37-45 (1998)The SwitchWare active network architecture., , , , , , , , and . IEEE Netw., 12 (3): 29-36 (1998)Computational complexity of some restricted instances of 3-SAT., , and . Discret. Appl. Math., 155 (5): 649-653 (2007)Concrete resource analysis of the quantum linear-system algorithm used to compute the electromagnetic scattering cross section of a 2D target., , , , , and . Quantum Inf. Process., 16 (3): 60 (2017)PLANet: An Active Internetwork., , , , and . INFOCOM, page 1124-1133. IEEE Computer Society, (1999)Linear-programming design and analysis of fast algorithms for Max 2-Sat and Max 2-CSP, and . CoRR, (2006)The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET., , , , , and . POLICY, page 174-177. IEEE Computer Society, (2009)Security in Active Networks., , , and . Secure Internet Programming, volume 1603 of Lecture Notes in Computer Science, page 433-451. Springer, (1999)