Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Routing Tree Construction in CTP., , and . WISA, volume 7115 of Lecture Notes in Computer Science, page 256-270. Springer, (2011)Characterizing Intelligence Gathering and Control on an Edge Network., , , , and . ACM Trans. Internet Techn., 11 (1): 2:1-2:26 (2011)Characterizing Organizational Use of Web-Based Services: Methodology, Challenges, Observations, and Insights., , , , and . TWEB, 5 (4): 19:1-19:23 (2011)MoVIE: A Measurement Tool for Mobile Video Streaming on Smartphones., and . ICPE, page 230-237. ACM, (2020)A tale of the tails: Power-laws in internet measurements., , , , and . IEEE Netw., 27 (1): 59-64 (2013)Synthetic Traffic Generation Techniques For ATM Network Simulations.. Simulation, 72 (5): 305-312 (1999)Estimating Instantaneous Cache Hit Ratio Using Markov Chain Analysis., , , and . IEEE/ACM Trans. Netw., 21 (5): 1472-1483 (2013)On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks., , and . SSS, volume 6366 of Lecture Notes in Computer Science, page 159-175. Springer, (2010)Campus-Level Instagram Traffic: A Case Study., , , and . MASCOTS, page 228-234. IEEE Computer Society, (2019)An application-level solution for the TCP-incast problem in data center networks., and . IWQoS, page 1-3. IEEE, (2011)