Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond Proportional Fair: Designing Robust Wireless Schedulers., , and . Networking, volume 4479 of Lecture Notes in Computer Science, page 1157-1160. Springer, (2007)PAQ: A Starvation-Resistant Alternative to Proportional Fair., , and . ICC, page 3012-3016. IEEE, (2008)Network entitlement: contract-based network sharing with agility and SLO guarantees., , , , , , , , , and 10 other author(s). SIGCOMM, page 250-263. ACM, (2022)A Social Network Under Social Distancing: Risk-Driven Backbone Management During COVID-19 and Beyond., , , , , , , , , and . NSDI, page 217-231. USENIX Association, (2021)A Measurement Study of Scheduler-Based Attacks in 3G Wireless Networks., , , and . PAM, volume 4427 of Lecture Notes in Computer Science, page 105-114. Springer, (2007)An algorithm for fitting MMPP to IP traffic traces., and . IEEE Communications Letters, 11 (2): 207-209 (2007)Detecting MS initiated signaling DDoS attacks in 3G/4G wireless networks., , , and . COMSNETS, page 1-60. IEEE, (2013)Predicting properties of congestion events for a queueing system with fBm traffic., , , and . IEEE/ACM Trans. Netw., 15 (5): 1098-1108 (2007)Speed-Breaker Early Warning System., , , and . NSDR, USENIX Association, (2012)Mobile applications tracking wireless user location., , , and . GLOBECOM, page 2006-2011. IEEE, (2012)