Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Context-free Languages are Not Closed under Interior and Frontier.. Bulletin of the EATCS, (1995)The traveling miser problem., , and . IEEE/ACM Trans. Netw., 14 (4): 711-724 (2006)Using Machine Learning to Detect Noisy Neighbors in 5G Networks., , , , , and . CoRR, (2016)Algorithms for Dynamic NFV Workload., , and . WAOA, volume 11312 of Lecture Notes in Computer Science, page 238-258. Springer, (2018)Coping with Interference: From Maximum Coverage to Planning Cellular Networks., , and . WAOA, volume 4368 of Lecture Notes in Computer Science, page 29-42. Springer, (2006)A Comparison of Exact and epsilon-Approximation Algorithms for Constrained Routing., , , and . Networking, volume 3976 of Lecture Notes in Computer Science, page 197-208. Springer, (2006)Resource Allocation Algorithms for the Next Generation Cellular Networks., and . Algorithms for Next Generation Networks, Springer, (2010)Time Dependent Multi Scheduling of Multicast., , and . ESA, volume 3221 of Lecture Notes in Computer Science, page 216-227. Springer, (2004)Competitive Analysis with a Sample and the Secretary Problem., , and . CoRR, (2019)The actual cost of software switching for NFV chaining., , , and . IM, page 335-343. IEEE, (2017)