From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mixture models of endhost network traffic., , , , и . INFOCOM, стр. 225-229. IEEE, (2013)Controlling IP Spoofing through Interdomain Packet Filters., , и . IEEE Trans. Dependable Secur. Comput., 5 (1): 22-36 (2008)Supervised Contrastive Learning for Interpretable Long-Form Document Matching., , , , и . ACM Trans. Knowl. Discov. Data, 17 (2): 27:1-27:17 (февраля 2023)An In-Depth Measurement Analysis of 5G mmWave PHY Latency and Its Impact on End-to-End Delay., , , , , , , , , и 1 other автор(ы). PAM, том 13882 из Lecture Notes in Computer Science, стр. 284-312. Springer, (2023)Limiting path exploration in BGP., , , и . INFOCOM, стр. 2337-2348. IEEE, (2005)Service Oriented Internet., , , и . ICSOC, том 2910 из Lecture Notes in Computer Science, стр. 543-558. Springer, (2003)User Modeling and Churn Prediction in Over-the-top Media Services., , и . ORSUM@RecSys, том 2715 из CEUR Workshop Proceedings, CEUR-WS.org, (2020)Damping BGP route flaps., , , , и . IPCCC, стр. 131-138. IEEE, (2004)Inferring Networked Device Categories from Low-Level Activity Indicators., , и . CoRR, (2017)Impact of IT monoculture on behavioral end host intrusion detection., , , , , и . WREN, стр. 27-36. ACM, (2009)