Author of the publication

Hierarchical Approach to Building Generative Networkload Models.

, , and . Computer Networks and ISDN Systems, 27 (7): 1193-1206 (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion detection through learning behavior model., and . Comput. Commun., 24 (12): 1202-1212 (2001)Ensemble Pruning Using Harmony Search., , , , and . HAIS (2), volume 7209 of Lecture Notes in Computer Science, page 13-24. Springer, (2012)Architecture, Design, Implementation and Performance Evaluation of Sarvagna: New Generation Search Engine., and . iiWAS, volume 170 of books@ocg.at, Austrian Computer Society, (2003)Hierarchical Approach to Building Generative Networkload Models., , and . Computer Networks and ISDN Systems, 27 (7): 1193-1206 (1995)On the Classification of Interactive Users Based on User Bahavior Indices., and . SIGMETRICS, page 40-48. ACM, (1985)Generative Networkload Models for a Single Server Environment., , and . SIGMETRICS, page 118-127. ACM, (1994)Web Recency Maintenance Protocol., and . IWDC, volume 2571 of Lecture Notes in Computer Science, page 35-44. Springer, (2002)AssocGEN: Engine for analyzing metadata based associations in digital evidence., and . SADFE, page 1-8. IEEE, (2013)Workload Models for Multiwindow Distributed Environments., and . MMB, volume 977 of Lecture Notes in Computer Science, page 314-326. Springer, (1995)A greedy approach to beacon placement for localization., and . Wireless Days, page 1-5. IEEE, (2008)