Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparative Evaluation of Two Scalable QoS Architectures., , , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 1452-1457. Springer, (2004)FSAD: Flow Similarity Analysis for Anomaly Detection in Cloud Applications., , and . CloudCom, page 426-429. IEEE Computer Society, (2015)Usability assessment of a Health Kiosk., , and . ISCC, page 260-265. IEEE Computer Society, (2017)Secure File Storage for Android Devices on Public Clouds., , and . CloudNet, page 1-4. IEEE, (2019)Inter-Domain QoS Routing with Virtual Trunks., and . ICC, page 139-146. IEEE, (2007)Performance Evaluation of the RSVP Reservation Aggregation Model., , , and . HSNMC, volume 3079 of Lecture Notes in Computer Science, page 167-178. Springer, (2004)Real-Time Wireless Data Plane for Real-Time-Enabled SDN., , , , and . WFCS, page 1-4. IEEE, (2019)Evaluation of a scalable reservation-based QoS architecture., , , and . ISCC, page 993-999. IEEE Computer Society, (2004)DMFD: Non-Intrusive Dependency Inference and Flow Ratio Model for Performance Anomaly Detection in Multi-Tier Cloud Applications., , and . CLOUD, page 164-173. IEEE, (2019)Secure Routing in Ad Hoc Networks for Reactive Next Hop Routing Protocols., , , and . International Conference on Wireless Networks, page 109-115. CSREA Press, (2004)