Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding HTTP Traffic and CDN Behavior from the Eyes of a Mobile ISP., , and . PAM, volume 8362 of Lecture Notes in Computer Science, page 268-271. Springer, (2014)Network security and anomaly detection with Big-DAMA, a big data analytics framework., , , , and . CloudNet, page 16-22. IEEE, (2017)YouTube all around: Characterizing YouTube from mobile and fixed-line network vantage points., , , , , and . EuCNC, page 1-5. IEEE, (2014)Detecting and diagnosing anomalies in cellular networks using Random Neural Networks., , , and . IWCMC, page 351-356. IEEE, (2016)On the use of Sub-Space Clustering & Evidence Accumulation for traffic analysis & classification., , and . IWCMC, page 1016-1021. IEEE, (2011)Machine Learning Models for YouTube QoE and User Engagement Prediction in Smartphones., , and . SIGMETRICS Perform. Evaluation Rev., 46 (3): 155-158 (2018)Looking for Network Latency Clusters in the LAC Region., and . LANCOMM@SIGCOMM, page 10-12. ACM, (2016)Diagnosing Device-Specific Anomalies in Cellular Networks., , , and . CoNEXT Student Workshop, page 18-20. ACM, (2014)Smart Active Sampling to enhance Quality Assurance Efficiency., , , , and . CoRR, (2022)DeepSec meets RawPower - Deep Learning for Detection of Network Attacks Using Raw Representations., , and . SIGMETRICS Perform. Evaluation Rev., 46 (3): 147-150 (2018)