Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Fast and Slow Lanes for Content Providers Using Software Defined Networking., , , , , and . IEEE/ACM Trans. Netw., 25 (3): 1373-1385 (2017)Anomalous loss performance for mixed real-time and TCP traffic in routers with very small buffers., , and . IEEE/ACM Trans. Netw., 19 (4): 933-946 (2011)Adapting router buffers for energy efficiency., , , , and . CoNEXT, page 19. ACM, (2011)An Examination of the Factors Contributing to Adoption Decisions among Late-Diffused Technology Products., and . New Media Soc., 5 (4): 547-572 (2003)Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email., , , , and . IEEE Trans. Prof. Commun., 55 (4): 345-362 (2012)Comparing Online Information Effects.. Communication Research, 30 (6): 579-598 (2003)Understanding and Reducing HVAC Power Consumption Post-Evacuation Events in Commercial Buildings., , , , and . IEEE Internet Things J., 9 (18): 17235-17248 (2022)Why do users not report spear phishing emails?, , , and . Telematics Informatics, (2020)An Empirical Investigation Into the Use of Heuristics and Information Cues by Bidders in Online Auctions.. Electron. Mark., 14 (3): 178-185 (2004)Energy Consumption of Content Distribution from Nano Data Centers versus Centralized Data Centers., , , , , and . SIGMETRICS Perform. Evaluation Rev., 42 (3): 49-54 (2014)