Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Duplicate detection methodology for IP network traffic analysis., , , and . M&N, page 161-166. IEEE, (2013)The effect of burst formation timers on video streaming over optical burst switched networks., , , and . BROADNETS, page 282-289. IEEE, (2008)Network monitoring for energy efficiency in large-scale networks: the case of the Spanish Academic Network., , , , , , , and . J. Supercomput., 62 (3): 1284-1304 (2012)Online classification of user activities using machine learning on network traffic., , , and . Comput. Networks, (2020)Crypto-ransomware detection using machine learning models in file-sharing network scenario with encrypted traffic., , , and . CoRR, (2022)Evaluation of RTT as an Estimation of Interactivity Time for QoE Evaluation in Remote Desktop Environments., , , and . ITNAC, page 240-245. IEEE, (2023)Strategies for the interconnection of heterogeneous optical networks., , , , , , , , , and 1 other author(s). ICTON, page 1-4. IEEE, (2014)On the blocking time distribution of core OBS switches., , , and . Photonic Netw. Commun., 18 (3): 314-322 (2009)On capacity planning for the GMPLS network control plane., , , , and . Photonic Netw. Commun., 15 (2): 159-169 (2008)Protocol-agnostic method for monitoring interactivity time in remote desktop services., , , and . Multim. Tools Appl., 80 (13): 19107-19135 (2021)