Author of the publication

Self-tuning Filers - Overload Prediction and Preventive Tuning Using Pruned Random Forest.

, , and . PAKDD (2), volume 10235 of Lecture Notes in Computer Science, page 495-507. (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The covert set-cover problem with application to Network Discovery, and . CoRR, (2012)Storage Load Control Through Meta-Scheduler Using Predictive Analytics., , and . ICDCIT, volume 9581 of Lecture Notes in Computer Science, page 75-86. Springer, (2016)PoEx: Proof of Existence for Evil Twin Attack Prevention in Wi-Fi Personal Networks., , and . FiCloud, page 92-98. IEEE, (2021)Simulator Prototyping Through Graphical Dependency Modeling., , and . MLDM, volume 9729 of Lecture Notes in Computer Science, page 584-598. Springer, (2016)Efficient Radix-4 Approximated Modified Booth Multiplier for Signal Processing and Computer Vision: A Probabilistic Design Approach., , , and . ISQED, page 1-8. IEEE, (2024)Closed WiFi Hotspot - Truly Hidden Network., , , and . ICCE, page 1-6. IEEE, (2023)The Covert Set-Cover Problem with Application to Network Discovery., and . WALCOM, volume 5942 of Lecture Notes in Computer Science, page 228-239. Springer, (2010)Towards privacy preserving threat intelligence., , and . J. Inf. Secur. Appl., (2018)Pruning a Random Forest by Learning a Learning Algorithm., , and . MLDM, volume 9729 of Lecture Notes in Computer Science, page 516-529. Springer, (2016)Dynamic Control of Storage Bandwidth Using Double Deep Recurrent Q-Network., , and . ICONIP (7), volume 11307 of Lecture Notes in Computer Science, page 222-234. Springer, (2018)