Author of the publication

Streaming Algorithms for Robust, Real-Time Detection of DDoS Attacks.

, , , and . ICDCS, page 4. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Detection of Distributed Constraint Violations., , , and . COMAD, page 230-239. Tata McGraw-Hill Publishing Company Limited, (2006)Efficient Global Transaction Management in Multidatabase Systems., , , , and . DASFAA, volume 4 of Advanced Database Research and Development Series, page 29-36. World Scientific, (1993)Mining Optimized Gain Rules for Numeric Attributes., , and . IEEE Trans. Knowl. Data Eng., 15 (2): 324-338 (2003)Mining Optimized Gain Rules for Numeric Attributes., , and . KDD, page 135-144. ACM, (1999)A Scalable Algorithm for Higher-order Features Generation using MinHash., , and . CIKM, page 1213-1222. ACM, (2018)Leveraging Uncertainty Estimates To Improve Classifier Performance., , , and . CoRR, (2023)Regular Expression Indexing., , and . Encyclopedia of Algorithms, Springer, (2008)Logical and Physical Versioning in Main Memory Databases., , , , , and . VLDB, page 86-95. Morgan Kaufmann, (1997)Efficient Algorithms for Mining Outliers from Large Data Sets., , and . SIGMOD Conference, page 427-438. ACM, (2000)SIGMOD Record 29(2), June 2000.XTRACT: A System for Extracting Document Type Descriptors from XML Documents., , , , and . SIGMOD Conference, page 165-176. ACM, (2000)SIGMOD Record 29(2), June 2000.