Author of the publication

Selfish behavior and stability of the internet: a game-theoretic analysis of TCP.

, , , , and . SIGCOMM, page 117-130. ACM, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting protein sequence conservation via metric embeddings., , , , and . ISMB (Supplement of Bioinformatics), page 122-129. (2003)Coalescing times for IID random variables with applications to population biology., , , and . Random Struct. Algorithms, 23 (2): 155-166 (2003)A Family of Simplex Variants Solving an m × d Linear Program in Expected Number of Pivot Steps Depending on d Only., , and . Math. Oper. Res., 11 (4): 570-590 (1986)Physical Mapping of Chromosomes Using Unique Probes., , , and . SODA, page 489-500. ACM/SIAM, (1994)The Complexity of Testing Whether a Graph is a Superconcentrator., , , , and . Inf. Process. Lett., 13 (4/5): 164-167 (1981)Heuristic algorithms in computational molecular biology.. J. Comput. Syst. Sci., 77 (1): 122-128 (2011)The minimum-entropy set cover problem., and . Theor. Comput. Sci., 348 (2-3): 240-250 (2005)An algorithm for analysing probed partial digestion experiments., and . Comput. Appl. Biosci., 11 (3): 229-235 (1995)A Gambling Game Arising in the Analysis of Adaptive Randomized Rounding., and . RANDOM-APPROX, volume 2764 of Lecture Notes in Computer Science, page 329-340. Springer, (2003)Subtree Isomorphism is in Random NC., , , and . AWOC, volume 319 of Lecture Notes in Computer Science, page 43-52. Springer, (1988)