Author of the publication

Mining checkins from location-sharing services for client-independent IP geolocation.

, , , , , and . INFOCOM, page 619-627. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Resource Allocation Policy Using Time Thresholding., and . Performance, page 395-413. North-Holland, (1983)Hybrid Packet FEC and Retransmission-based Erasure Recovery Mechanisms for Lossy Networks: Analysis and Design., , and . COMSWARE, IEEE, (2007)Machine Learning at the Edge: Efficient Utilization of Limited CPU/GPU Resources by Multiplexing., , and . ICNP, page 1-6. IEEE, (2020)Towards a ubiquitous cloud computing infrastructure., , , , , , and . LANMAN, page 1-6. IEEE, (2010)OpenNetVM: Flexible, high performance NFV (Demo)., , , , , , , and . LANMAN, page 1-2. IEEE, (2016)CleanG - Improving the Architecture and Protocols for Future Cellular Networks With NFV., , and . IEEE/ACM Trans. Netw., 28 (6): 2559-2572 (2020)Load Balancing of Heterogeneous Workloads in Memcached Clusters., , , , and . Feedback Computing, USENIX Association, (2014)SDNFV: Flexible and Dynamic Software Defined Control of an Application- and Flow-Aware Data Plane., , , , , and . Middleware, page 2. ACM, (2016)Measurement based characterization and provisioning of IP VPNs., , , and . Internet Measurement Conference, page 342-355. ACM, (2004)Multipath Support for Name-based Information Dissemination in Fragmented Networks., , , , , and . ICN, page 201-202. ACM, (2015)