Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stochastic Loss Aversion for Random Medium Access., and . GAMENETS, volume 105 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 236-247. Springer, (2012)Unsupervised Parsimonious Cluster-Based Anomaly Detection (PCAD)., , and . MLSP, page 1-6. IEEE, (2018)Sequential anomaly detection in a batch with growing number of tests: Application to network intrusion detection., , and . MLSP, page 1-6. IEEE, (2012)Hierarchical shaped deficit round-robin scheduling., , and . GLOBECOM, page 6. IEEE, (2005)Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited., and . GLOBECOM, page 2957-2961. IEEE, (2003)A control theoretic approach for designing adaptive AQM schemes., , , and . GLOBECOM, page 2947-2951. IEEE, (2003)An Epidemiological Model for File-Sharing with BitTorrent-like Incentives: The Case of a Fixed Peer Population., , , and . GLOBECOM, IEEE, (2006)Performance Evaluation of Multilevel-Assignment Hierarchical Round-Robin Bandwidth Scheduling for ATM, and . page 1247-1256. (1997)Class-based stabilized virtual buffer-an AQM scheme with stability, fairness and QoS assurance, , , and . (2003)Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks., , , and . ICC, page 3807-3811. IEEE, (2004)