Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fair and Performance Guaranteed Methods for Flat-Rate Unlimited Access Service Plan., , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 392-404. Springer, (2004)A network mobility management scheme for fast QoS handover., , and . WICON, page 82. ICST, (2008)Generating Comprehension Questions Using Paraphrase., , , and . TAAI, volume 8916 of Lecture Notes in Computer Science, page 310-321. Springer, (2014)Spectrum analysis for detecting slow-paced persistent activities in network security., , , and . ICC, page 1985-1989. IEEE, (2013)WF2Q-M : a worst-case fair weighted fair queueing with maximum rate control., , and . GLOBECOM, page 1576-1580. IEEE, (2002)Traffic engineering for hose-model VPN provisioning., , and . GLOBECOM, page 6. IEEE, (2005)A Spectral Efficient and Fair User-Centric Spectrum Allocation Approach for Downlink Transmissions., , , and . GLOBECOM, page 1-6. IEEE, (2011)An Aging Theory for Event Life-Cycle Modeling., , and . IEEE Trans. Syst. Man Cybern. Part A, 37 (2): 237-248 (2007)Coding-Aware Peer-to-Peer Data Repair in Multi-Rate Wireless Networks: A Game Theoretic Analysis., , , and . IEEE J. Sel. Areas Commun., 31 (9-Supplement): 391-398 (2013)Slow-Paced Persistent Network Attacks Analysis and Detection Using Spectrum Analysis., , , and . IEEE Syst. J., 10 (4): 1326-1337 (2016)