Author of the publication

Traffic engineering based on local states in Internet protocol-based radio access networks.

, , , , , , and . J. Commun. Networks, 7 (3): 377-384 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Communication Networks Adaptive measurement-based traffic engineering in small differentiated services domains., , , , and . Eur. Trans. Telecommun., 18 (1): 35-47 (2007)Securing Layer 2 in Local Area Networks., , , , , and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 699-706. Springer, (2005)Towards an Approach for Automatically Repairing Compromised Network Systems., , , , and . NCA, page 389-392. IEEE Computer Society, (2004)Adaptive Per-Flow Traffic Engineering Based on Probe Packet Measurements., , , , and . CNSR, page 131-136. IEEE Computer Society, (2005)SVMs Modeling for Highly Imbalanced Classification., , , and . IEEE Trans. Syst. Man Cybern. Part B, 39 (1): 281-288 (2009)Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data., , , and . Artificial Intelligence and Pattern Recognition, page 174-180. ISRST, (2008)Fast and Effective Spam Sender Detection with Granular SVM on Highly Imbalanced Mail Server Behavior Data., , , and . CollaborateCom, IEEE Computer Society / ICST, (2006)Valkyrie: Behavioral malware detection using global kernel-level telemetry data., , and . MLSP, page 1-6. IEEE, (2015)Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine., , , , and . USENIX Security Symposium, page 101-118. USENIX Association, (2009)Mining DNS for malicious domain registrations., , , and . CollaborateCom, page 1-6. ICST / IEEE, (2010)