Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Principal component analysis of BGP update streams., , and . J. Commun. Networks, 12 (2): 191-197 (2010)From traffic matrix to routing matrix: PoP level traffic characteristics for a Tier-1 ISP., , and . SIGMETRICS Perform. Evaluation Rev., 38 (3): 49-54 (2010)Efficient Selective Frame Discard Algorithms for Stored Video Delivery Across Resource Constrained Networks., , , and . Real Time Imaging, 7 (3): 255-273 (2001)A security framework for protecting traffic between collaborative domains., , and . Microprocess. Microsystems, 28 (10): 547-559 (2004)Fundamental Trade-Offs in Aggregate Packet Scheduling., , and . IEEE Trans. Parallel Distributed Syst., 16 (12): 1166-1177 (2005)Virtual time reference system: a unifying scheduling framework for scalable support of guaranteed services., , and . IEEE J. Sel. Areas Commun., 18 (12): 2684-2695 (2000)Leveraging client-side DNS failure patterns to identify malicious behaviors., , , , , , and . CNS, page 406-414. IEEE, (2015)Separation of benign and malicious network events for accurate malware family classification., , and . CNS, page 125-133. IEEE, (2015)Editorial., , and . POMACS, 1 (1): 1 (2017)Maximizing the bandwidth multiplier effect for hybrid cloud-P2P content distribution., , , , and . IWQoS, page 1-9. IEEE, (2012)