Author of the publication

M2SDN: Achieving multipath and multihoming in data centers with software defined networking.

, , and . IWQoS, page 11-20. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Realizing Fine-Grained Inference of AS Path With a Generative Measurable Process., , , and . IEEE/ACM Trans. Netw., 31 (6): 3112-3127 (December 2023)Security evaluation of MISTY structure with SPN round function., , , and . Comput. Math. Appl., 65 (9): 1264-1279 (2013)A novel blockchain-based privacy-preserving framework for online social networks., , , , , and . Connect. Sci., 33 (3): 555-575 (2021)A new multistage approach to detect subtle DDoS attacks., , , and . Math. Comput. Model., 55 (1-2): 198-213 (2012)Efficient DVFS to Prevent Hard Faults for Many-Core Architectures., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 674-679. Springer, (2014)DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation., , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 271-284. Springer, (2013)A Routing Optimization Algorithm for BGP Egress Selection., , , and . ICDCIT, volume 4317 of Lecture Notes in Computer Science, page 192-199. Springer, (2006)Using Split Queues to Improve the Performance of Parallel Switch., , , and . APPT, volume 2834 of Lecture Notes in Computer Science, page 3-11. Springer, (2003)iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency., , and . SIGCOMM Posters and Demos, page 166-168. ACM, (2019)Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm., , , and . Future Gener. Comput. Syst., 27 (8): 1124-1134 (2011)