Author of the publication

Efficient Recovery from False State in Distributed Routing Algorithms.

, , , and . Networking, volume 6091 of Lecture Notes in Computer Science, page 198-212. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neighbor discovery in wireless networks with multipacket reception., , , , , and . MobiHoc, page 3. ACM, (2011)Efficient Algorithms for Neighbor Discovery in Wireless Networks., , , and . IEEE/ACM Trans. Netw., 21 (1): 69-83 (2013)A case for coalitions in data swarming systems., , , and . ICNP, page 246-255. IEEE Computer Society, (2011)Optimal Power Allocation in Wireless Networks with Transmitter-Receiver Power Tradeoffs., , , and . INFOCOM, IEEE, (2006)Facilitating Access Point Selection in IEEE 802.11 Wireless Networks., , , , and . Internet Measurement Conference, page 293-298. USENIX Association, (2005)Asynchronous Neighbor Discovery on Duty-Cycled Mobile Devices: Models and Schedules., , , , , , and . IEEE Trans. Wirel. Commun., 19 (8): 5204-5217 (2020)Neighbor Discovery in Wireless Networks with Multipacket Reception., , , , , and . IEEE Trans. Parallel Distributed Syst., 26 (7): 1984-1998 (2015)Multi-user diversity for secrecy in wireless networks., , , , , and . ITA, page 482-490. IEEE, (2010)Bandwidth Provisioning in Infrastructure-Based Wireless Networks Employing Directional Antennas., , , and . ICDCN, volume 5935 of Lecture Notes in Computer Science, page 295-306. Springer, (2010)Security-capacity trade-off in large wireless networks using keyless secrecy., , and . MobiHoc, page 21-30. ACM, (2010)