Author of the publication

Tree-based link-state routing in the presence of routing information corruption.

, and . ICCCN, page 364-370. IEEE, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web Services., and . Moving Target Defense, volume 54 of Advances in Information Security, Springer, (2011)Tree-based link-state routing in the presence of routing information corruption., and . ICCCN, page 364-370. IEEE, (1999)Transitional behaviors of general AIMD rate control., and . ICCCN, page 132-137. IEEE, (2002)On the Performance and Feasibility of Multicast Core Selection Heuristics., , and . ICCCN, page 296-303. IEEE Computer Society, (1998)An adaptive global reduction algorithm for wormhole-routed 2D meshes., and . SPDP, page 114-119. IEEE, (1995)A security evaluation of a novel resilient web serving architecture: Lessons learned through industry/academia collaboration., , , and . DSN Workshops, page 188-193. IEEE Computer Society, (2010)Group leader election under link-state routing., and . Comput. Commun., 23 (7): 653-666 (2000)Multicast Virtual Topologies for Collective Communication in MPCs and ATM Clusters., , and . SC, page 9. ACM, (1995)Incorruptible system self-cleansing for intrusion tolerance., , and . IPCCC, IEEE, (2006)Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES)., , and . ARES, page 343-350. IEEE Computer Society, (2007)