Author of the publication

Probabilistic Award Strategy for Contract Net Protocol in Massively Multi-agent Systems.

, , and . ICAART (2), page 165-171. INSTICC Press, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comparison of web privacy protection techniques., , and . Comput. Commun., (2019)Highly available network design and resource management of SINET4., , , , , , , and . Telecommun. Syst., 56 (1): 33-47 (2014)A cause of self-similarity in TCP traffic., , and . Int. J. Commun. Syst., 18 (6): 603-617 (2005)Towards detecting DNSSEC validation failure with passive measurements., , and . NOMS, page 1-6. IEEE, (2020)Combining Communication Patterns & Traffic Patterns to Enhance Mobile Traffic Identification Performance., , and . J. Inf. Process., 24 (2): 247-254 (2016)Layer-1 Bandwidth on Demand Services in SINET3., , , , , , , , , and 1 other author(s). GLOBECOM, page 2286-2291. IEEE, (2007)Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory., , , and . TMA, volume 6003 of Lecture Notes in Computer Science, page 101-114. Springer, (2010)Combining multiresolution and random projections for robust statistical analysis and anomaly detection., , , and . AINTEC, page 1-2. ACM, (2009)Mining Causality of Network Events in Log Data., , , and . IEEE Trans. Netw. Serv. Manag., 15 (1): 53-67 (2018)Network application profiling with traffic causality graphs., , , , and . Int. J. Netw. Manag., 24 (4): 289-303 (2014)