Author of the publication

The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET.

, , , , , and . POLICY, page 174-177. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Polynomial Constraint Satisfaction: A Framework for Counting and Sampling CSPs and Other Problems, and . CoRR, (2006)Self Adaptive Robust Resource Allocation for Prioritized TCP Flows in Wireless Networks., , , , and . SASO Workshops, page 108-113. IEEE Computer Society, (2015)Judicious partitions and related problems.. BCC, volume 327 of London Mathematical Society Lecture Note Series, page 95-117. Cambridge University Press, (2005)The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET., , , , , and . POLICY, page 174-177. IEEE Computer Society, (2009)Security in Active Networks., , , and . Secure Internet Programming, volume 1603 of Lecture Notes in Computer Science, page 433-451. Springer, (1999)Programming the quantum future., , , , and . Commun. ACM, 58 (8): 52-61 (2015)An LP-Designed Algorithm for Constraint Satisfaction., and . ESA, volume 4168 of Lecture Notes in Computer Science, page 588-599. Springer, (2006)Active Bridging., , , and . SIGCOMM, page 101-111. ACM, (1997)Safety and security of programmable network infrastructures., , , and . IEEE Commun. Mag., 36 (10): 84-92 (1998)Polynomial bounds for chromatic number. I. Excluding a biclique and an induced tree., , and . J. Graph Theory, 102 (3): 458-471 (2023)