Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithms for rapid outbreak detection: a research synthesis, , , , and . J. Biomedical Informatics, (2005)NetFPGA SUME: Toward 100 Gbps as Research Commodity., , , and . IEEE Micro, 34 (5): 32-41 (2014)An Intoductory Tutorial on Kd-Trees. (1991)Fast inference and learning in large-state-space HMMs., and . ICML, volume 119 of ACM International Conference Proceeding Series, page 800-807. ACM, (2005)Fast nearest-neighbor search in disk-resident graphs., and . KDD, page 513-522. ACM, (2010)Authentication for Resilience: The Case of SDN., , , and . Security Protocols Workshop, volume 8263 of Lecture Notes in Computer Science, page 39-44. Springer, (2013)Fast State Discovery for HMM Model Selection and Learning., , and . AISTATS, volume 2 of JMLR Proceedings, page 492-499. JMLR.org, (2007)Traffic Trace Artifacts due to Monitoring Via Port Mirroring., and . E2EMON, page 1-8. IEEE Computer Society, (2007)Measuring Burstiness in Data Center Applications., , and . BS, page 5:1-5:6. ACM, (2019)A Garch-based adaptive playout delay algorithm for VoIP., , , and . Comput. Networks, 54 (17): 3108-3122 (2010)