Author of the publication

Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic.

, , , , and . Comput. J., 55 (6): 740-755 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influence of Chord Length on the Blocking Performance of Wavelength-Routed Chordal Ring Networks., and . ONDM, volume 204 of IFIP Conference Proceedings, page 79-88. Kluwer, (2001)A tool for estimating the hurst parameter and for generating self-similar sequences., , , , and . SummerSim, page 40. SCS/ ACM, (2014)Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic., , , , and . Comput. J., 55 (6): 740-755 (2012)Multiple-description video coding based on JPEG 2000 MQ-coder registers., , , and . ISCAS, page 1827-1830. IEEE, (2010)Performance Analysis of Degree Four Topologies for the Optical Core of IP-over-WDM Networks., , and . ICOIN, volume 2662 of Lecture Notes in Computer Science, page 108-117. Springer, (2003)A new architectural approach for optical burst switching networks based on a common control channel., , , , and . Opt. Switch. Netw., 4 (3-4): 173-188 (2007)The whole mesh Deformation Model for 2D and 3D image segmentation., , , and . ICIP, page 4045-4048. IEEE, (2009)The Dynamic Topology Changes model for unsupervised image segmentation., , , and . MMSP, page 1-5. IEEE, (2009)A new 3D image segmentation method for parallel architectures., , , and . ICME, page 1813-1816. IEEE, (2009)Secure communications and data management in ubiquitous services., , , and . Int. J. Commun. Syst., 22 (9): 1065-1068 (2009)