Christos Douligeris

According to our database1, Christos Douligeris authored at least 189 papers between 1991 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
ForChaos: Real Time Application DDoS Detection Using Forecasting and Chaos Theory in Smart Home IoT Network.
Wireless Communications and Mobile Computing, 2019

Collision-Free Advertisement Scheduling for IEEE 802.15.4-TSCH Networks.
Sensors, 2019

Optimal routing approaches for IEEE 802.15.4 TSCH networks.
Trans. Emerging Telecommunications Technologies, 2019

Learning with the AppInventor programming software through the use of structured educational scenarios in secondary education in Greece.
EAIT, 2019

EduApp: A Collaborative Application for Mobile Devices to Support the Educational Process in Greek Secondary Education.
Proceedings of the IEEE Global Engineering Education Conference, 2019

Spyduino: Arduino as a HID Exploiting the BadUSB Vulnerability.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

2018
Factors, issues and interdependencies in the incorporation of a Web 2.0 based learning environment in higher education.
EAIT, 2018

The charger positioning problem in clustered RF-power harvesting wireless sensor networks.
Ad Hoc Networks, 2018

A policy-aware Service Oriented Architecture for secure machine-to-machine communications.
Ad Hoc Networks, 2018

LOST: Localized blacklisting aware scheduling algorithm for IEEE 802.15.4-TSCH networks.
Proceedings of the 2018 Wireless Days, 2018

A case study of a laboratory experimental process in Vocational Education Training (VET).
Proceedings of the 2018 South-Eastern European Design Automation, 2018

Preliminary design of a new approach to choose cyber exercise methodologies for critical infrastructures.
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018

Study, design and development of a modern video system to improve services from the production to the end user.
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018

Collision-Free Broadcast Methods for IEEE 802.15.4-TSCH Networks Formation.
Proceedings of the 21st ACM International Conference on Modeling, 2018

Exploring Cyber-Security Issues in Vessel Traffic Services.
Proceedings of the Knowledge Science, Engineering and Management, 2018

R-TSCH: Proactive Jamming Attack Protection for IEEE 802.15.4-TSCH Networks.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Computing optimal drone positions to wirelessly recharge IoT devices.
Proceedings of the IEEE INFOCOM 2018, 2018

Improving LoRa Network Capacity Using Multiple Spreading Factor Configurations.
Proceedings of the 25th International Conference on Telecommunications, 2018

Local or Global Radio Channel Blacklisting for IEEE 802.15.4-TSCH Networks?
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Let's learn with Kahoot!
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

2017
A Policy-Aware Model for Intelligent Transportation Systems.
CoRR, 2017

A DSS model for IoT-based intelligent transportation systems.
Proceedings of the 2017 IEEE International Symposium on Signal Processing and Information Technology, 2017

On the optimal number of chargers in battery-less wirelessly powered sensor networks.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

An iOS Knowledge App to Support the Course "Developing Applications in a Programming Environment" of the Greek Lyceum.
Proceedings of the Interactive Mobile Communication Technologies and Learning - Proceedings of the 11th IMCL Conference, 30 November, 2017

WIP: Design, Development and Implementation of a "Web Technologies" Android Application for Higher Education.
Proceedings of the Interactive Mobile Communication Technologies and Learning - Proceedings of the 11th IMCL Conference, 30 November, 2017

A Game-Based Learning Platform for Vocational Education and Training.
Proceedings of the Interactive Mobile Communication Technologies and Learning - Proceedings of the 11th IMCL Conference, 30 November, 2017

Adaptation of a Conference Key Distribution System for the wireless ad hoc network.
Proceedings of the IEEE International Conference on Communications, 2017

Employing Twitter Hashtags and Linked Data to Suggest Trending Resources in a Digital Library.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2017

Work in progress: Extending the application of ontologies in the teaching of geometry: The right triangle in the circle.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

Teaching conceptual modelling: The OMiLAB best practice.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

Science, technology, engineering and mathematics (STEM) for vocational education in Greece.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

Contemporary collaborative trends and their effect in education.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

A design and evaluation framework for visual programming codes.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

Factors affecting peer assessment of student presentations.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

2016
Energy Efficient Sensor Network Configuration for Covering Points of Interest.
Proceedings of the SENSORNETS 2016, 2016

Design and Development of a Learning Management System for Vocational Education.
Proceedings of the SouthEast European Design Automation, 2016

An Identity and Access Management approach for SOA.
Proceedings of the 2016 IEEE International Symposium on Signal Processing and Information Technology, 2016

Transport services within the IoT ecosystem using localisation parameters.
Proceedings of the 2016 IEEE International Symposium on Signal Processing and Information Technology, 2016

Optimizing SLA-driven adaptive routing.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Towards mobile cloud security performance: A cross-border approach.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Daedalus: An ICT Tool for Employment within the Mediterranean Basin Region.
Proceedings of the Social Media: The Good, the Bad, and the Ugly, 2016

Applying ontologies in an educational context.
Proceedings of the 2016 IEEE Global Engineering Education Conference, 2016

2015
Energy efficient automated control of irrigation in agriculture by using wireless sensor networks.
Computers and Electronics in Agriculture, 2015

UACS: Towards unified access control services.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2015

Performance evaluation of cloud systems: A behavioural approach.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2015

A heuristic for routing, modulation and spectrum allocation in spectrum sliced elastic optical path network.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2015

A cooperative framework towards self-protection and self-organization in Mobile Ad Hoc Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Towards a Successful Exercise Implementation - A Case Study of Exercise Methodologies.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Evaluating Web 2.0 technologies in higher education using students' perceptions and performance.
J. Comp. Assisted Learning, 2014

SociaLib: a collaborative digital library model platform using Web 2.0.
The Electronic Library, 2014

Software in e-Learning Architecture, Processes and Management.
CoRR, 2014

Pirus: A Web-based File Hosting Service with Object Oriented Logic in Cloud Computing.
CoRR, 2014

A Semantic Web Approach in the Implementation of a Linked Data Portal Using a CMS.
Proceedings of the Tenth International Conference on Signal-Image Technology and Internet-Based Systems, 2014

A secure clustering scheme for geographically routed wireless ad hoc networks.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014

Earth and groundwater visualisation using 3D modelling techniques in a cloud computing environment.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014

Pirus: A file storage service in cloud computing for educational use.
Proceedings of the 2014 IEEE Global Engineering Education Conference, 2014

A Low-Overhead Localized Target Coverage Algorithm in Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks - 6th International ICST Conference, 2014

2013
Policy-based QoS management for SLA-driven adaptive routing.
Journal of Communications and Networks, 2013

An effective and secure web banking system: development and evaluation.
IJBIS, 2013

Energy Efficient Routing in Wireless Sensor Networks Through Balanced Clustering.
Algorithms, 2013

Combining technologies with the ECFS file system.
Proceedings of the 2013 12th International Conference on Information Technology Based Higher Education and Training, 2013

Welcome message from the general co-chairs.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Sensor Swarm query filtering: Heightened attack resilience for broadcast on-demand services.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

SAnoVS: Secure anonymous voting scheme for clustered ad hoc networks.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

S-Port: Collaborative security management of Port Information systems.
Proceedings of the 4th International Conference on Information, 2013

Unisuite: An innovative integrated suite for delivering synchronous and asynchronous online education.
Proceedings of the IEEE Global Engineering Education Conference, 2013

Security Risk Assessment Challenges in Port Information Technology Systems.
Proceedings of the E-Democracy, Security, Privacy and Trust in a Digital World, 2013

2012
Collaborative service evaluation with the TwoHop trust framework.
Security and Communication Networks, 2012

Using data envelopment analysis to evaluate the efficiency of web caching object replacement strategies.
J. Network and Computer Applications, 2012

Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack.
IEEE Communications Letters, 2012

Chord-PKI: A distributed trust infrastructure based on P2P networks.
Computer Networks, 2012

Global Communications Newsletter.
IEEE Communications Magazine, 2012

Using Strand Space Model to Verify the Privacy Properties of a Fair Anonymous Authentication Scheme.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

I.P.AD.: An Integrated Project Management and Instructional Systems Development Model for E-learning.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

NAVI: Novel authentication with visual information.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Fair Anonymous Authentication for Location Based Services.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

An integrated self-evaluated framework for embedding Web 2.0 technologies in the educational process.
Proceedings of the IEEE Global Engineering Education Conference, 2012

2011
Editorial on "QoS and service provisioning for integrated wireless networks".
Pervasive and Mobile Computing, 2011

An Advanced Web Attack Detection and Prevention Tool.
Inf. Manag. Comput. Security, 2011

Connected coverage in WSNs based on critical targets.
Computer Networks, 2011

Towards Utilizing Tcpcrypt in Mobile Healthcare Applications.
Proceedings of the Wireless Mobile Communication and Healthcare, 2011

Spatio temporal emergency role based access control (STEM-RBAC): A time and location aware role based access control model with a break the glass mechanism.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Target location based sink positioning in wireless sensor networks.
Proceedings of the 18th International Conference on Telecommunications, 2011

User dependent cryptography for security in future mobile telecommunication systems.
Proceedings of the 18th International Conference on Telecommunications, 2011

2010
Security for Ad Hoc Networks.
Proceedings of the Handbook of Information and Communication Security, 2010

Expanding topological vulnerability analysis to intrusion detection through the incident response intelligence system.
Inf. Manag. Comput. Security, 2010

Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks.
I. J. Network Security, 2010

Bridging theory and practice in e-government: A set of guidelines for architectural design.
Government Information Quarterly, 2010

Solving coverage problems in wireless sensor networks using cover sets.
Ad Hoc Networks, 2010

A secure ubiquitous healthcare system based on IMS and the HL7 standards.
Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, 2010

An Analysis of Bluetooth, Zigbee and Bluetooth Low Energy and Their Use in WBANs.
Proceedings of the Wireless Mobile Communication and Healthcare, 2010

Efficient target coverage in WSNs with bidirectional communication.
Proceedings of the 15th IEEE International Workshop on Computer Aided Modeling, 2010

2009
A future location-aware replacement policy for the cache management at the mobile terminal.
Wireless Communications and Mobile Computing, 2009

DPS: An Architecture for VBR Scheduling in IEEE 802.11e HCCA Networks with Multiple Access Points.
MONET, 2009

Energy efficiency in wireless sensor networks using sleep mode TDMA scheduling.
Ad Hoc Networks, 2009

LIDF: Layered intrusion detection framework for ad-hoc networks.
Ad Hoc Networks, 2009

A Novel Power-Efficient Middleware Scheme for Sensor Grid Applications.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

Exploring The Dynamics Of Change In European Municipal Settings: A Case Study Of Two Research And Development Projects.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009

An Efficient Simulator for Reactive Web Caching.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009

SWEB: An Advanced Mobile Residence Certificate Service.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

Studying the Interaction of the Epistemology in e-Government, Organization Studies and Information Systems.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

A mobile healthcare system using IMS and the HL7 framework.
Proceedings of the 2009 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2009

2008
Home Automation.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Provision of unified IN functionality in the context of IMS.
Telecommunication Systems, 2008

Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks
CoRR, 2008

Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms
CoRR, 2008

Intrusion Detection Using Cost-Sensitive Classification
CoRR, 2008

Group registration with distributed databases for location tracking in 3G wireless networks.
Computer Networks, 2008

Topological Dependence and Fault Tolerance in TDMA Based Power Conservation for WSNs.
Proceedings of the WINSYS 2008, 2008

Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms.
Proceedings of the Advances in Ad Hoc Networking, 2008

Technological integration: evidence of processes of structuring in governmental organizations.
Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, 2008

TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
An evaluation of the middleware's impact on the performance of object oriented distributed systems.
Journal of Systems and Software, 2007

A context-aware cache structure for mobile computing environments.
Journal of Systems and Software, 2007

Incident response requirements for distributed security information management systems.
Inf. Manag. Comput. Security, 2007

Multifold node authentication in mobile ad hoc networks.
Int. J. Communication Systems, 2007

Towards secure online elections: models, primitives and open issues.
EG, 2007

Authentication in a layered security approach for mobile ad hoc networks.
Computers & Security, 2007

A tree-based decision rule for identifying profile groups of cases without predefined classes: application in diffuse large B-cell lymphomas.
Comp. in Bio. and Med., 2007

SecMR - a secure multipath routing protocol for ad hoc networks.
Ad Hoc Networks, 2007

Detecting unauthorized and compromised nodes in mobile ad hoc networks.
Ad Hoc Networks, 2007

Location Management in 3G Networks using a 2-Level Distributed Database Architecture.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Extending a Distributed System Architecture with E-Government Modelling Concepts.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Privacy Threats of Data Retention in Internet Communications.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Ontology-based tools for the management of customers' portfolios in a deregulated electricity market environment.
Proceedings of the Metadata and Semantics, 2007

A cache management object oriented simulation for mobile environments.
Proceedings of the 10th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2007

Web Proxy CachingObject Replacement: Frontier Analysis to Discover the Good-Enough Algorithms.
Proceedings of the 15th International Symposium on Modeling, 2007

Intrusion Detection with Neural Networks and Watermarking Techniques for MANET.
Proceedings of the IEEE International Conference on Pervasive Services, 2007

Enhancing the design of e-government: identifying structures and modelling concepts in contemporary platforms.
Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, 2007

Chord-PKI: Embedding a Public Key Infrastructure into the Chord Overlay Network.
Proceedings of the Public Key Infrastructure, 2007

2006
QoS-aware TDMA for end-to-end traffic scheduling in ad hoc networks.
IEEE Wireless Commun., 2006

Group Registration with Local Anchor for Location Tracking in Mobile Networks.
IEEE Trans. Mob. Comput., 2006

On Incident Handling and Response: A state-of-the-art approach.
Computers & Security, 2006

Layered security design for mobile ad hoc networks.
Computers & Security, 2006

Secure distributed intelligent networks.
Computer Communications, 2006

A future location-prediction replacement strategy for mobile computing environments.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Intrusion Detection Using Emergent Self-organizing Maps.
Proceedings of the Advances in Artificial Intelligence, 4th Helenic Conference on AI, 2006

A context-aware prefetching strategy for mobile computing environments.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

2005
Performance Analysis of Secure Multipath Routing Protocols for Mobile Ad Hoc Networks.
Proceedings of the Wired/Wireless Internet Communications, Third International Conference, 2005

Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

Secure Multipath Routing for Mobile Ad Hoc Networks.
Proceedings of the 2nd International Conference on Wireless on Demand Network Systems and Service (WONS 2005), 2005

Preventing Impersonation Attacks in MANET with Multi-Factor Authentication.
Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, 2005

Multipath Routing Protocols for Mobile Ad Hoc Networks: Security Issues and Performance Evaluation.
Proceedings of the Autonomic Communication, Second International IFIP Workshop, 2005

Applying the ISO RM-ODP Standard in E-Government.
Proceedings of the E-Government: Towards Electronic Democracy, International Conference, 2005

LUGrid: A Semantic-Capable Grid for University Data.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

Engineering and Technology Aspects of an e-Government Architecture Based on Web Services.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

2004
A distributed database architecture for global roaming in next-generation mobile networks.
IEEE/ACM Trans. Netw., 2004

An integrated strategy for reducing location management cost.
IEEE Communications Letters, 2004

DDoS attacks and defense mechanisms: classification and state-of-the-art.
Computer Networks, 2004

Intelligent Web Prefetching Based upon User Profiles - The WebNaut Case.
Proceedings of the Methods and Applications of Artificial Intelligence, 2004

2003
Group Registration for Reducing Signaling Traffic in Location Tracking.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

2002
Design and architecture of a digital music library on the web (Technical note).
The New Review of Hypermedia and Multimedia, 2002

Group deregistration strategy for PCS networks.
IEEE Communications Letters, 2002

Computational intelligence in telecommunications networks.
Computer Communications, 2002

Using Hopfield Networks to Solve Assignment Problem and N-Queen Problem: An Application of Guided Trial and Error Technique.
Proceedings of the Methods and Applications of Artificial Intelligence, 2002

Performance evaluation of delay-constrained least-cost QoS routing algorithms based on linear and nonlinear Lagrange relaxation.
Proceedings of the IEEE International Conference on Communications, 2002

2001
Computer networks design using hybrid fuzzy expert systems.
Soft Comput., 2001

An efficient approximate algorithm for delay-cost-constrained QoS routing.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

2000
Guest editorial: intelligent techniques in high speed networks.
IEEE Journal on Selected Areas in Communications, 2000

Fuzzy reasoning approach for QoS routing in B-ISDN.
Journal of Intelligent and Fuzzy Systems, 2000

A location-based mobility tracking scheme for PCS networks.
Computer Communications, 2000

An integrated strategy for location tracking in mobile networks.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Extending the Prediction Horizon in Dynamic Bandwidth Allocation for VBR Video Transport.
Proceedings of the MICAI 2000: Advances in Artificial Intelligence, 2000

Switching Theory Approach to Alarm Correlation in Network Management.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

High Throughput Database Structures for Location Management in PCS Networks.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

Using Hopfield Networks to Solve Traveling Salesman Problems Based on Stable State Analysis Technique.
Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, 2000

Performance Evaluation of Location Information Distribution Strategies for Mobility Tracking.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems, 2000

1999
A Maritime Global Route Planning Model for Hazardous Materials Transportation.
Transportation Science, 1999

Fuzzy generalized network approach for solving an optimization model for routing in B-ISDN.
Telecommunication Systems, 1999

Fuzzy Temporal Reasoning Model for Event Correlation in Network Management.
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999

Two location tracking strategies for PCS systems.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

1998
The dynamic three-tier protocol: an access remedial scheme for DQDB Metropolitan Area Networks.
Computer Communications, 1998

Fuzzy multiobjective routing model in B-ISDN.
Computer Communications, 1998

1997
Rate Regulation with Feedback Controller in ATM Networks - A Neural Network Approach.
IEEE Journal on Selected Areas in Communications, 1997

Application of Neural Networks and Machine Learning in Network Design.
IEEE Journal on Selected Areas in Communications, 1997

Fuzzy Optimization Model for Routing in B-ISDN.
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997

An integrated AI approach for automating networks design, modeling and simulation.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

Routing in multimetric networks using a fuzzy link cost.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

1996
Demand and service matching at heavy loads: a dynamic bandwidth control mechanism for DQDB MANs.
IEEE Trans. Communications, 1996

NAMS: Network Automated Modeler and Simulator.
Proceedings of the Proceedings 29st Annual Simulation Symposium (SS '96), 1996

1995
Fairness Issues in the Networking Environment.
Computer Communications, 1995

Fairness by Demand and Service Pattern Match: The Alpha Tuning Mechanism for DQDB MANs.
Proceedings of the Proceedings IEEE INFOCOM '95, 1995

1994
A telecommunications quality study using the analytic hierarchy process.
IEEE Journal on Selected Areas in Communications, 1994

Implementation of a decentralized Pareto optimal algorithm.
Computer Communications, 1994

The Dynamic 3-Tier Protocol: An Access Remedial Scheme to Control Unfairness in DQDB MANs.
Proceedings of the Proceedings 19th Conference on Local Computer Networks, 1994

1992
Convergence of synchronous and asynchronous greedy algorithms in a multiclass telecommunications environment.
IEEE Trans. Communications, 1992

Multiobjective Flow Control in Telecommunication Networks.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992

1991
Fairness in network optimal flow control: optimality of product forms.
IEEE Trans. Communications, 1991

Convergence of Synchronous and Asynchronous Algorithms in Multiclass Networks.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991


  Loading...