Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power Law and Exponential Decay of Intercontact Times between Mobile Devices., , and . IEEE Trans. Mob. Comput., 9 (10): 1377-1390 (2010)Comparing traffic classifiers., and . Comput. Commun. Rev., 37 (3): 65-68 (2007)xJS: Practical XSS Prevention for Web Application Development., , , , , and . WebApps, USENIX Association, (2010)Power law and exponential decay of inter contact times between mobile devices., , and . MobiCom, page 183-194. ACM, (2007)Behavioral profiles for advanced email features., and . WWW, page 711-720. ACM, (2009)Software-defined caching: managing caches in multi-tenant data centers., , , , , , , and . SoCC, page 174-181. ACM, (2015)Address and traffic dynamics in a large enterprise network., and . LANMAN, page 102-107. IEEE, (2008)Interference management for unlicensed users in shared CBRS spectrum., , , , and . CoNEXT, page 333-345. ACM, (2018)Characterizing podcast services: publishing, usage, and dissemination., , , and . Internet Measurement Conference, page 209-222. ACM, (2009)Towards unlicensed cellular networks in TV white spaces., , , , , and . CoNEXT, page 2-14. ACM, (2017)