From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Duplicate detection methodology for IP network traffic analysis., , , и . M&N, стр. 161-166. IEEE, (2013)Online classification of user activities using machine learning on network traffic., , , и . Comput. Networks, (2020)Network monitoring for energy efficiency in large-scale networks: the case of the Spanish Academic Network., , , , , , , и . J. Supercomput., 62 (3): 1284-1304 (2012)The effect of burst formation timers on video streaming over optical burst switched networks., , , и . BROADNETS, стр. 282-289. IEEE, (2008)Crypto-ransomware detection using machine learning models in file-sharing network scenario with encrypted traffic., , , и . CoRR, (2022)Evaluation of RTT as an Estimation of Interactivity Time for QoE Evaluation in Remote Desktop Environments., , , и . ITNAC, стр. 240-245. IEEE, (2023)Strategies for the interconnection of heterogeneous optical networks., , , , , , , , , и 1 other автор(ы). ICTON, стр. 1-4. IEEE, (2014)Alias resolution techniques: long-term analysis of alias stability in internet routers., , , и . PM2HW2N@MSWiM, стр. 5-12. ACM, (2013)Effective Analysis of Secure Web Response Time., , , и . TMA, стр. 145-152. IEEE, (2019)TBDClust: Time-based density clustering to enable free browsing of sites in pay-per-use mobile Internet providers., , , , и . J. Netw. Comput. Appl., (2017)