Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TCP With Network Coding Enhanced in Bi-Directional Loss Tolerance., , and . IEEE Communications Letters, 24 (3): 520-524 (2020)TCP with network coding meets loss burstiness estimation for lossy networks., , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 303-314. Springer, (2016)Benefits of Multiply-Cascaded TCP Tunnel with Network Coding over Lossy Networks., , , and . WWIC, volume 10372 of Lecture Notes in Computer Science, page 247-258. Springer, (2017)Deep Transfer Learning: A Novel Collaborative Learning Model for Cyberattack Detection Systems in IoT Networks., , , , , , , and . CoRR, (2021)Overlaying a hypergraph with a graph with bounded maximum degree., , , and . Discret. Appl. Math., (2022)On Optimization of Minimized Assumption Generation Method for Component-Based Software Verification., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (9): 1451-1460 (2012)Graph problems motivated by (low and high) resolution models of large protein assemblies. (Problèmes de graphes motivés par des modèles basse et haute résolution de grands assemblages de protéines).. University of Côte d'Azur, Nice, France, (2021)A mechanism for inferring approximate solutions under incomplete knowledge based on rule similarity., , and . Syst. Comput. Jpn., 33 (9): 78-89 (2002)On Reducing Measurement Load on Control-Plane in Locating High Packet-Delay Variance Links for OpenFlow Networks., , , , and . EIDWT, volume 65 of Lecture Notes on Data Engineering and Communications Technologies, page 232-245. Springer, (2021)A runtime approach for estimating resource usage., , and . SoICT, page 261-266. ACM, (2013)