Author of the publication

The Impact of Loss Generation on Emulation-based Protocol Evaluation.

, , and . Parallel and Distributed Computing and Networks, page 231-237. IASTED/ACTA Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of Loss Generation on Emulation-based Protocol Evaluation., , and . Parallel and Distributed Computing and Networks, page 231-237. IASTED/ACTA Press, (2006)An Evaluation of Side-Information Assisted Forensic Hash Matching.. COMPSAC Workshops, page 331-336. IEEE Computer Society, (2014)Using triggers for emulation of opportunistic networking., , , and . MobiOpp, page 155-158. ACM, (2010)Classification of indecent videos by low complexity repetitive motion detection., , and . AIPR, page 1-7. IEEE Computer Society, (2008)DIOPT: Extremely Fast Classification Using Lookups and Optimal Feature Discretization., and . IJCNN, page 1-8. IEEE, (2020)A clustering-based analysis of DPI-labeled video flow characteristics in cellular networks.. IM, page 991-994. IEEE, (2017)Using Partial Signatures in Intrusion Detection for Multipath TCP., , , and . NordSec, volume 11875 of Lecture Notes in Computer Science, page 71-86. Springer, (2019)Efficient traffic offloading for seamless connectivity in 5G networks onboard high speed trains., , , , and . PIMRC, page 1-6. IEEE, (2017)Estimating data transfer capacity for intermittent connectivity: A transport aware model., , and . PIMRC, page 1-6. IEEE, (2016)Examining cellular access systems on trains: Measurements and change detection., , and . TMA, page 1-6. IEEE, (2017)