Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Topology Vulnerability/Cost Trade-Off: Model, Application, and Computational Complexity., and . Internet Math., 11 (6): 588-626 (2015)Quantifying Information Exposure in Internet Routing., , and . CoRR, (2019)A novel approach to bottleneck analysis in networks., , and . NOMS, page 65-72. IEEE, (2008)User Experiences with Third-Party SIM Cards and ID Registration in Kenya and Tanzania., , , , , and . CoRR, (2023)A Learning and Control Perspective for Microfinance., , , , , and . CoRR, (2022)Poster: Proposal of an Intelligent Remote Tutoring Model., , , , and . IMCL, volume 1192 of Advances in Intelligent Systems and Computing, page 297-306. Springer, (2019)Impact of the Utilization of the Biodigester in the Populations of Bambey and Perspectives for Mass Adoption and Valorization., , , , , , , , , and . InterSol/CNRIA, volume 204 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 81-93. Springer, (2017)Measurements of the Most Significant Software Security Weaknesses., , , and . CoRR, (2021)Quantifying Network Topology Robustness under Budget Constraints: General Model and Computational Complexity., and . GameSec, volume 8252 of Lecture Notes in Computer Science, page 154-174. Springer, (2013)Quantifying all-to-one network topology robustness under budget constraints., and . SIGMETRICS Perform. Evaluation Rev., 41 (4): 8-11 (2014)