Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PCPV: Pattern-based Cost-efficient Proactive VNF placement and chaining for value-added services in content delivery networks., , , , , , and . NetSoft, page 313-317. IEEE, (2018)Self-modeling based diagnosis of Software-Defined Networks., , and . NetSoft, page 1-6. IEEE, (2015)Ontology-based model for trusted critical site supervision in FUSE-IT., , , , , , , and . ICIN, page 313-315. IEEE, (2017)Minimizing the Number of IGMP Report Messages for Receiver-Driven Layered Video Multicasting., , , , , and . VTC Spring, page 1-5. IEEE, (2011)Understanding the evolution of multimedia content in the Internet through BitTorrent glasses., , , , and . CoRR, (2017)Adaptive Delay-Aware Energy Efficient TDM-PON., , , , and . Comput. Networks, 57 (7): 1577-1596 (2013)Data Anonymization for Maintenance Knowledge Sharing., , and . IT Prof., 23 (5): 23-30 (2021)Digital Twins: Properties, Software Frameworks, and Application Scenarios., and . IT Prof., 23 (1): 51-55 (2021)A blockchain-based secure storage and access control scheme for supply chain finance., , , , and . J. Supercomput., 79 (1): 109-138 (2023)An reinforcement learning-based speech censorship chatbot system., , , , and . J. Supercomput., 78 (6): 8751-8773 (2022)