Author of the publication

Tracking transaction footprints for non-intrusive end-to-end monitoring.

, , , and . Clust. Comput., 12 (1): 59-72 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deployment Study Length: How Long Should a System Be Evaluated in the Wild?, , , , and . GetMobile, 19 (2): 18-21 (2015)Influencing Participant Behavior Through a Notification-Based Recommendation System., , , , , , , , and . PERSUASIVE, volume 10809 of Lecture Notes in Computer Science, page 113-119. Springer, (2018)Session details: EDUCATION., and . GetMobile, (2018)Concurrent Wi-Fi for mobile users: analysis and measurements., , , , , and . CoNEXT, page 4. ACM, (2011)Fast determination of QoS-based multicast routes in wireless networks using genetic algorithm., and . ICC, page 2588-2592. IEEE, (2001)Mirage: Mitigating illicit inventorying in a RFID enabled retail environment., and . COMSNETS, page 1-9. IEEE, (2011)KARMA: Improving WiFi-based indoor localization with dynamic causality calibration., , , , , and . SECON, page 90-98. IEEE, (2014)Non-intrusive transaction monitoring using system logs., , , and . NOMS, page 879-882. IEEE, (2008)Cross-Level Detection Framework for Attacks on Cyber-Physical Systems., , , , , , , and . J. Hardw. Syst. Secur., 1 (4): 356-369 (2017)An efficient multi-objective QoS-routing algorithm for wireless multicasting., , and . VTC Spring, page 1160-1164. IEEE, (2002)