Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traffic shaping for a loss system., , and . IEEE Communications Letters, 4 (12): 417-419 (2000)A Study of Non-neutral Networks with Usage-Based Prices., , , , , and . ETM, volume 6236 of Lecture Notes in Computer Science, page 76-84. Springer, (2010)Memory-efficient content filtering hardware for high-speed intrusion detection systems., , , , , and . SAC, page 264-269. ACM, (2007)When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time., , and . CoRR, (2017)Generation bidding game with flexible demand., , , , , , , and . CoRR, (2014)Market-based power allocation for a differentially priced FDMA system., , and . ISIT, page 1011-1015. IEEE, (2014)Learning to route queries in unstructured P2P networks: Achieving throughput optimality subject to query resolution constraints., , and . INFOCOM, page 2327-2335. IEEE, (2012)Side-payment profitability under convex demand-response modeling congestion-sensitive applications.. ICC, page 2785-2789. IEEE, (2012)A study of unsupervised adaptive crowdsourcing., and . ICC, page 1438-1442. IEEE, (2012)Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic., , and . CoRR, (2019)