Author of the publication

Designing, Developing and Deploying an Enterprise Scale Network Monitoring System.

, , , , and . ISEC, page 18:1-18:5. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards an Understanding of Situated AR Visualization for Basketball Free-Throw Training., , , , , , and . CHI, page 461:1-461:13. ACM, (2021)Classification of First Trimester Ultrasound Images Using Deep Convolutional Neural Network., , and . AII, page 92-105. (2021)Identification of Crown and Rump in First-Trimester Ultrasound Images Using Deep Convolutional Neural Network., , , and . AII, page 231-247. (2022)Designing, Developing and Deploying an Enterprise Scale Network Monitoring System., , , , and . ISEC, page 18:1-18:5. ACM, (2022)A technique for associating political alignment to users., and . ICACCI, page 251-257. IEEE, (2015)Coverage Hole Detection and Healing to Enhance Coverage and Connectivity in 3D Spaces for WSNs: A Mathematical Analysis., and . Wireless Personal Communications, 96 (2): 2863-2876 (2017)Cumulative Vehicle Routing Problem: A Column Generation Approach., and . CALDAM, volume 8959 of Lecture Notes in Computer Science, page 262-274. Springer, (2015)Throughput and Delay Analysis of Slotted MACA-BI MAC Protocol for Mobile Ad Hoc Network., and . J. Next Gener. Inf. Technol., 1 (3): 12-20 (2010)Energy-Efficient Deterministic Approach for Coverage Hole Detection in Wireless Underground Sensor Network: Mathematical Model and Simulation., and . Comput., 11 (6): 86 (2022)Graph Covering Using Bounded Size Subgraphs., , and . CALDAM, volume 13947 of Lecture Notes in Computer Science, page 415-426. Springer, (2023)