Author of the publication

Predicting and bypassing end-to-end Internet service degradations.

, , , and . IEEE J. Sel. Areas Commun., 21 (6): 961-978 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing the "Wisdom of the Crowd"., , and . EC, page 605-606. ACM, (2013)Multiple Source Adaptation and the Renyi Divergence, , and . CoRR, (2012)Constant-Time Local Computation Algorithms., , and . Theory Comput. Syst., 62 (2): 249-267 (2018)Combining Online Algorithms for Acceptance and Rejection., , , and . Theory of Computing, 1 (1): 105-117 (2005)Learning What's Going on: Reconstructing Preferences and Priorities from Opaque Transactions., , and . ACM Trans. Economics and Comput., 6 (3-4): 13:1-13:20 (2018)Nonstochastic Bandits with Composite Anonymous Feedback., , and . COLT, volume 75 of Proceedings of Machine Learning Research, page 750-773. PMLR, (2018)Optimal Broadcast with Partial Knowledge (Extended Abstract)., , , and . WDAG, volume 972 of Lecture Notes in Computer Science, page 116-130. Springer, (1995)Scheduling Multipacket Frames with Frame Deadlines., , and . SIROCCO, volume 9439 of Lecture Notes in Computer Science, page 76-90. Springer, (2015)Online learning versus offline learning., , and . EuroCOLT, volume 904 of Lecture Notes in Computer Science, page 38-52. Springer, (1995)On the Bit Complexity of Distributed Computations in a Ring with a Leader., and . PODC, page 151-160. ACM, (1986)