Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Solution Algorithms for Factored MDPs, , , and . Journal of Artificial Intelligence Research (JAIR), (2003)Large-scale app-based reporting of customer problems in cellular networks: potential and limitations., , , , , , , , and . W-MUST@SIGCOMM, page 13-18. ACM, (2011)Internet-scale Visualization and Detection of Performance Events., , , and . USENIX ATC, USENIX Association, (2011)Towards Identifying Impacted Users in Cellular Services., and . KDD, page 3029-3039. ACM, (2019)Smoothing out focused demand for network resources., , , and . EC, page 245-248. ACM, (2001)Black Box Anomaly Detection: Is It Utopian?., , , , and . HotNets, ACM SIGCOMM, (2006)Characterizing and Optimizing Cellular Network Performance During Crowded Events., , , , , and . IEEE/ACM Trans. Netw., 24 (3): 1308-1321 (2016)Characterizing data usage patterns in a large cellular network., , , , , , , , and . CellNet@SIGCOMM, page 7-12. ACM, (2012)Fig: Automatic Fingerprint Generation., , , , and . NDSS, The Internet Society, (2007)Limits of Learning-based Signature Generation with Adversaries., , and . NDSS, The Internet Society, (2008)