Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Probabilistic Packet Marking., , , and . ICNP, page 368-377. IEEE Computer Society, (2005)Efficient Algorithms for Regret Minimization in Billboard Advertisement (Student Abstract)., , , and . AAAI, page 16148-16149. AAAI Press, (2023)Maximizing the Earned Benefit in an Incentivized Social Networking Environment: An Integer Programming-Based Approach., , and . COMAD/CODS, page 322-325. ACM, (2019)Airshark: detecting non-WiFi RF devices using commodity WiFi hardware., , and . Internet Measurement Conference, page 137-154. ACM, (2011)802.11n under the microscope., , , and . Internet Measurement Conference, page 105-110. ACM, (2008)MoB: a mobile bazaar for wide-area wireless services., , , and . MobiCom, page 228-242. ACM, (2005)Efficient Bandwidth Guaranteed Restoration Algorithms for Multicast Connections., , and . NETWORKING, volume 3462 of Lecture Notes in Computer Science, page 1005-1017. Springer, (2005)Augmenting Self-Driving with Remote Control: Challenges and Directions., , , and . HotMobile, page 19-24. ACM, (2018)Towards client-assisted management in large-scale wireless networks.. WiOpt, page 1. IEEE, (2009)BlackOut and Obfuscator: An Exploration of the Design Space for Privacy-Preserving Interventions for Voice Assistants, , , , and . arXiv preprint arXiv:1812.00263, (2018)