Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The effect of burst formation timers on video streaming over optical burst switched networks., , , and . BROADNETS, page 282-289. IEEE, (2008)Duplicate detection methodology for IP network traffic analysis., , , and . M&N, page 161-166. IEEE, (2013)Online classification of user activities using machine learning on network traffic., , , and . Comput. Networks, (2020)Network monitoring for energy efficiency in large-scale networks: the case of the Spanish Academic Network., , , , , , , and . J. Supercomput., 62 (3): 1284-1304 (2012)Crypto-ransomware detection using machine learning models in file-sharing network scenario with encrypted traffic., , , and . CoRR, (2022)Evaluation of RTT as an Estimation of Interactivity Time for QoE Evaluation in Remote Desktop Environments., , , and . ITNAC, page 240-245. IEEE, (2023)Strategies for the interconnection of heterogeneous optical networks., , , , , , , , , and 1 other author(s). ICTON, page 1-4. IEEE, (2014)Effective Analysis of Secure Web Response Time., , , and . TMA, page 145-152. IEEE, (2019)TBDClust: Time-based density clustering to enable free browsing of sites in pay-per-use mobile Internet providers., , , , and . J. Netw. Comput. Appl., (2017)Alias resolution techniques: long-term analysis of alias stability in internet routers., , , and . PM2HW2N@MSWiM, page 5-12. ACM, (2013)