Author of the publication

Persistent Spread Measurement for Big Network Data Based on Register Intersection.

, , , and . Proc. ACM Meas. Anal. Comput. Syst., 1 (1): 15:1-15:29 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporally or Spatially Dispersed Joint RFID Estimation Using Snapshots of Variable Lengths., , , and . MobiHoc, page 247-256. ACM, (2015)Per-flow counting for big network data stream over sliding windows., , , and . IWQoS, page 1-10. IEEE, (2017)On Deletion of Outsourced Data in Cloud Computing., , , and . IEEE CLOUD, page 344-351. IEEE Computer Society, (2014)Privacy-Preserving Point-to-Point Transportation Traffic Measurement through Bit Array Masking in Intelligent Cyber-physical Road Systems., , , , and . GreenCom/iThings/CPScom, page 826-833. IEEE, (2013)Privacy preserving origin-destination flow measurement in vehicular cyber-physical systems., , , and . CPSNA, page 32-37. IEEE Computer Society, (2013)Threshold-Based Widespread Event Detection., , and . ICDCS, page 399-408. IEEE, (2019)Persistent Traffic Measurement through Vehicle-to-Infrastructure Communications in Cyber-Physical Road Systems., , , , , and . IEEE Trans. Mob. Comput., 18 (7): 1616-1630 (2019)Adaptive Joint Estimation Protocol for Arbitrary Pair of Tag Sets in a Distributed RFID System., , , , , and . IEEE/ACM Trans. Netw., 25 (5): 2670-2685 (2017)Achieving Strong Privacy in Online Survey., , , and . ICDCS, page 710-719. IEEE Computer Society, (2017)Limiting Self-Propagating Malware Based on Connection Failure Behavior through Hyper-Compact Estimators., , , and . CoRR, (2016)