Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traffic shaping for a loss system., , and . IEEE Communications Letters, 4 (12): 417-419 (2000)Memory-efficient content filtering hardware for high-speed intrusion detection systems., , , , , and . SAC, page 264-269. ACM, (2007)Generation bidding game with flexible demand., , , , , , , and . CoRR, (2014)Generation bidding game with potentially false attestation of flexible demand., , , , , , and . EURASIP J. Adv. Signal Process., (2015)Relative entropy between Markov transition rate matrices., and . IEEE Trans. Inf. Theory, 39 (3): 1056-1057 (1993)A taxonomy of internet traceback., and . Int. J. Secur. Networks, 1 (1/2): 54-61 (2006)Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs., and . IEEE J. Sel. Areas Commun., 25 (6): 1113-1123 (2007)Network NonNeutrality on the Internet: Content Provision Under a Subscription Revenue Model., , and . SIGMETRICS Perform. Evaluation Rev., 42 (3): 44 (2014)A Game of Uncoordinated Sharing of Private Spectrum Commons., , and . SIGMETRICS Perform. Evaluation Rev., 42 (3): 42 (2014)Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification., , and . ICASSP, page 3827-3831. IEEE, (2020)