Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Metadata in SLA Negotiation over Premium IP Networks., , , , and . ICDCS Workshops, page 30-35. IEEE Computer Society, (2004)Traffic Management., , , , , , , , , and 12 other author(s). QofIS Final Report, volume 2856 of Lecture Notes in Computer Science, Springer, (2003)Identification of Traffic Flows Hiding behind TCP Port 80., , , , and . ICC, page 1-6. IEEE, (2010)Worm Traffic Analysis and Characterization., , and . ICC, page 1435-1442. IEEE, (2007)Measuring Quality of Service Parameters over Heterogeneous IP Networks., , , and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 718-727. Springer, (2005)Discovering Topologies at Router Level., , and . IPOM, volume 3751 of Lecture Notes in Computer Science, page 118-129. Springer, (2005)Detecting Third-Party Addresses in Traceroute Traces with IP Timestamp Option., , and . PAM, volume 7799 of Lecture Notes in Computer Science, page 21-30. Springer, (2013)Reviewing Traffic Classification., , , , , and . Data Traffic Monitoring and Analysis, volume 7754 of Lecture Notes in Computer Science, Springer, (2013)Hic Sunt Proxies: Unveiling Proxy Phenomena in Mobile Networks., , , and . TMA, page 227-232. IEEE, (2019)A map-based platform for smart mobility services., , , , and . ISCC, page 19-24. IEEE Computer Society, (2015)