Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Data-Driven Approach to Client-Transparent Access Selection of Dual-Band WiFi., , , , and . IEEE Trans. Network and Service Management, 16 (1): 321-333 (2019)Self-Similar Characteristic of Traffic in Current Metro Area Network., , , , and . LANMAN, page 176-181. IEEE, (2007)Cross-layer Path Selection in Multi-path Transport Protocol for Mobile Devices., , , , and . CoRR, (2020)Sequential and adaptive sampling for matrix completion in network monitoring systems., , , , , , and . INFOCOM, page 2443-2451. IEEE, (2015)Accurate recovery of Internet traffic data: A tensor completion approach., , , , , and . INFOCOM, page 1-9. IEEE, (2016)Rogue access point detection using segmental TCP jitter., , and . WWW, page 1249-1250. ACM, (2008)Lightweight Trilinear Pooling based Tensor Completion for Network Traffic Monitoring., , , , and . INFOCOM, page 2128-2137. IEEE, (2022)Accurate Recovery of Internet Traffic Data: A Sequential Tensor Completion Approach., , , , , , , and . IEEE/ACM Trans. Netw., 26 (2): 793-806 (2018)Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler., , , and . Networking, page 154-162. IEEE, (2020)Compact-index: an efficient index algorithm for network traffic., , , and . CoNEXT, page 90-103. ACM, (2021)