Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network externalities and the deployment of security features and protocols in the internet., and . SIGMETRICS, page 37-48. ACM, (2008)A local mean field analysis of security investments in networks., and . NetEcon, page 25-30. ACM, (2008)Theory and practice of cross-traffic estimation., , , , and . SIGMETRICS, page 400-401. ACM, (2005)Modeling the economic value of the location data of mobile users., and . INFOCOM, page 1467-1475. IEEE, (2011)The Problem of Sensing Unused Cellular Spectrum., , , and . Networking (2), volume 6641 of Lecture Notes in Computer Science, page 198-212. Springer, (2011)On optimal probing for delay and loss measurement., , , and . Internet Measurement Conference, page 291-302. ACM, (2007)PNP: Fast Path Ensemble Method for Movie Design., , , , , , and . CoRR, (2016)Probing for Loss: The Case Against Probe Trains., , , and . IEEE Communications Letters, 15 (5): 590-592 (2011)Mobile call graphs: beyond power-law and lognormal distributions., , , , , and . KDD, page 596-604. ACM, (2008)Cyber Insurance as an Incentivefor Internet Security., and . Managing Information Risk and the Economics of Security, Springer, (2009)