Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly Detection Methods for IIoT Networks., and . SOLI, page 214-219. IEEE, (2018)Reliability-constrained least-cost routing in multihop networks., , and . DRCN, page 197-202. IEEE, (2003)Differentiated Survivability Framework and Modeling for Heterogeneous Grooming Optical Networks., , and . GLOBECOM, page 2320-2324. IEEE, (2007)A Fast and Efficient Segmented Signalling Protocol for GMPLS/WDM Optical Networks., , , and . ICC, page 5422-5426. IEEE, (2008)Establishing switch-disjoint connections in stage-controlled Banyans., and . ISPAN, page 110-116. IEEE Computer Society, (1996)A Hierarchical Analysis Approach for High Performance Computing and Communication Applications., , , , and . HICSS, IEEE Computer Society, (1999)Dynamic Routing of Reliability-Differentiated Connections in WDM Optical Networks., , and . LCN, page 190-199. IEEE Computer Society, (2005)Effect of routing convergence time on lightpath establishment in GMPLS-controlled WDM optical networks., , , and . ICC, page 1692-1696. IEEE, (2005)Distributed network control for establishing reliability-constrained least-cost lightpaths in WDM Mesh networks., , and . Comput. Commun., 30 (7): 1546-1561 (2007)A flexible integrated multi-layer protection scheme for IP-over-WDM networks., , and . ICON, page 595-599. IEEE, (2004)