Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-real time content scheduling in wireless data networks., , , and . PIMRC, page 1375-1379. IEEE, (2004)Non-Real-Time Content Scheduling Algorithms for Wireless Data Networks., , and . IEEE Trans. Computers, 55 (7): 893-905 (2006)Real-time Video Stream Aggregation in Wireless Mesh Network., , , and . PIMRC, page 1-7. IEEE, (2006)Complete statistical theory of learning: learning using statistical invariants., and . COPA, volume 128 of Proceedings of Machine Learning Research, page 4-40. PMLR, (2020)Feature Cultivation in Privileged Information-augmented Detection., , and . IWSPA@CODASPY, page 73-80. ACM, (2017)Peer-to-peer streaming of stored media: the indirect approach., , , , and . SIGMETRICS/Performance, page 371-372. ACM, (2006)Centralized multi-scale singular value decomposition for feature construction in LIDAR image classification problems., , , , and . AIPR, page 1-6. IEEE Computer Society, (2012)Adaptive rate-based feedback flow control algorithms-extensions to multicast connections., , and . ISCC, page 154-160. IEEE Computer Society, (1998)Non-Uniform Waveband Hierarchy in Hybrid Optical Networks., , , and . INFOCOM, page 1344-1354. IEEE Computer Society, (2003)Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems., , , , , and . MILCOM, page 874-879. IEEE, (2021)