Author of the publication

Primary Path Effect in Multi-Path TCP: How Serious Is It for Deployment Consideration?

, , , and . MobiHoc, page 36:1-36:2. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalability of Correlation Clustering Through Constraint Reduction., , and . CODS, page 1-10. ACM, (2014)Modular approach for anomaly based NIDS., and . COMSWARE, page 1-6. IEEE, (2006)Emotion Dynamics of Public Opinions on Twitter., , , , and . ACM Trans. Inf. Syst., 38 (2): 18:1-18:24 (2020)Packet header attack by hardware trojan in NoC based TCMP and its impact analysis., , , , and . NOCS, page 21-28. ACM, (2021)Evaluating the Effectiveness of Soft K-Means in Detecting Overlapping Clusters., , , , and . ICTCS, page 4:1-4:6. (2016)Consistent Coordination Decoupling in Tuple Space Based Mobile Middleware: Design and Formal Specifications., , and . ICDCIT, volume 7753 of Lecture Notes in Computer Science, page 220-231. Springer, (2013)Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol., , and . SIN, page 111-118. ACM, (2011)Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity., , , , and . ICDCIT, volume 11319 of Lecture Notes in Computer Science, page 422-439. Springer, (2019)DisTree: A scheme for DHT., and . ICACCI, page 794-799. IEEE, (2013)Performance optimization in single channel directional multi-interface IEEE 802.11s EDCA using beam prioritization., , and . ICC, page 5451-5456. IEEE, (2012)