Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VoIP Measurement Architecture Using Data Mediation., and . IPOM, volume 5843 of Lecture Notes in Computer Science, page 15-26. Springer, (2009)Extendable NFV-Integrated Control Method Using Reinforcement Learning., , , , , and . CoRR, (2019)Routing and Capacity Optimization Based on Estimated Latent OD Traffic Demand., , and . COMPSAC, page 1169-1175. IEEE, (2020)Packet Sampling TCP Flow Rate Estimation and Performance Degradation Detection Method., , , , and . IEICE Trans. Commun., 91-B (5): 1309-1319 (2008)Extending Black Domain Name List by Using Co-occurrence Relation between DNS Queries., , , and . LEET, USENIX Association, (2010)Detecting mass-mailing worm infected hosts by mining DNS traffic data., , , , , and . MineNet, page 159-164. ACM, (2005)Hierarchical traffic engineering based on model predictive control., , , , , , and . ICNC, page 1-7. IEEE Computer Society, (2016)Framework for traffic engineering under uncertain traffic information., , , , , , and . ICTC, page 264-266. IEEE, (2016)2-D Bitmap for Summarizing Inter-Host Communication Patterns., , , , , and . SAINT Workshops, page 83. IEEE Computer Society, (2007)Estimating Traffic Latent Due to QoS Deterioration: A Time-Series Causal Inference Approach., and . ITC, page 1-6. IEEE, (2023)