Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Protection of a High Performance Load Balancer Against SYN Attacks**This is an extended journal version of 2., , , and . IEEE Trans. Cloud Comput., 11 (3): 2897-2909 (July 2023)Optimal Path and Minimal Spanning Trees in Random Weighted Networks., , , , , , , , , and . Int. J. Bifurc. Chaos, 17 (7): 2215-2255 (2007)Online exploration outside a convex obstacle., , , and . Theor. Comput. Sci., (2022)An efficient priority mechanism for token-ring networks., and . IEEE Trans. Commun., 42 (234): 1769-1777 (1994)On interval and circular-arc covering problems., and . Ann. Oper. Res., 275 (2): 281-295 (2019)Micro Base Station Aided Failover for Multicast Scheduling in Wireless Cellular Networks., , and . IEEE Trans. Wirel. Commun., 13 (9): 5251-5263 (2014)Multiple logical token-rings in a single high-speed ring., and . IEEE Trans. Commun., 42 (234): 1712-1721 (1994)Stability and Topology of Scale-Free Networks under Attack and Defense Strategies, , , , and . Physical Review Letters, (2005)MTS Sketch for Accurate Estimation of Set-Expression Cardinalities from Small Samples., , and . CoRR, (2016)Bounding the Bias of Tree-Like Sampling in IP Topologies, , and . CoRR, (2006)