Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond the Click-Through Rate: Web Link Selection with Multi-level Feedback., , , and . IJCAI, page 3308-3314. ijcai.org, (2018)ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems., , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 82-101. Springer, (2012)Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks., , and . NOMS, page 424-435. IEEE, (2006)Tracking Influential Nodes in Time-Decaying Dynamic Interaction Networks., , , , and . ICDE, page 1106-1117. IEEE, (2019)Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems., , and . IWQoS, page 30-39. IEEE, (2006)Analysis and scheduling of practical network coding in OFDMA relay networks., , and . Comput. Networks, 53 (12): 2120-2139 (2009)Deriving an Optimal Synchronization Interval for Supporting View Consistency in a Distributed Virtual Environment., , and . Multimedia Information Systems, page 99-106. (1999)Incentive and service differentiation in P2P networks: a game theoretic approach., , , and . IEEE/ACM Trans. Netw., 14 (5): 978-991 (2006)Blender: Self-randomizing Address Space Layout for Android Apps., , and . RAID, volume 9854 of Lecture Notes in Computer Science, page 457-480. Springer, (2016)DroidEagle: seamless detection of visually similar Android apps., , and . WISEC, page 9:1-9:12. ACM, (2015)