Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Focal Any-Angle Path-finding Algorithm Based on A* on Visibility Graphs., , , and . CoRR, (2017)Experimental Analysis of Super-Seeding in BitTorrent., , , , and . ICC, page 65-69. IEEE, (2008)Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks., , , and . IWQoS, page 286-287. IEEE, (2006)Hash-AV: fast virus signature scanning by cache-resident filters., and . GLOBECOM, page 6. IEEE, (2005)Hash-AV: fast virus signature scanning by cache-resident filters., and . Int. J. Secur. Networks, 2 (1/2): 50-59 (2007)A Reinforcement Learning Hyper-Heuristic in Multi-Objective Single Point Search with Application to Structural Fault Identification., and . CoRR, (2018)Active Cache: caching dynamic contents on the Web., , and . Distributed Systems Engineering, 6 (1): 43-50 (1999)Efficient Implementation of Dilithium Signature Scheme on FPGA SoC Platform., , , and . IEEE Trans. Very Large Scale Integr. Syst., 30 (9): 1158-1171 (2022)Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (4): 27-56 (2021)Design and Development of a Hair-like Sensor with Bridge-Type Flexible Amplification Mechanisms., , , , , and . Sensors, 23 (17): 7354 (September 2023)