Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying dynamic IP address blocks serendipitously through background scanning traffic., , and . CoNEXT, page 4. ACM, (2007)YouTube traffic dynamics and its interplay with a tier-1 ISP: an ISP perspective., , and . Internet Measurement Conference, page 431-443. ACM, (2010)Full-sharing: efficient bandwidth scheduling for video streaming over broadband cable networks (BCNs)., , and . Multimedia Tools Appl., 33 (2): 131-156 (2007)Reducing Unwanted Traffic in a Backbone Network., , and . SRUTI, USENIX Association, (2005)Wheel of Trust: A Secure Framework for Overlay-Based Services., and . ICC, page 1148-1153. IEEE, (2007)Influence Diffusion Dynamics and Influence Maximization in Social Networks with Friend and Foe Relationships, , , and . CoRR, (2011)Joint Cache Resource Allocation and Request Routing for In-network Caching Services., , , , and . CoRR, (2017)Computing Symmetric Functions with AND/OR Circuits and a Single MAJORITY Gate., , and . STACS, volume 665 of Lecture Notes in Computer Science, page 535-544. Springer, (1993)A Closer Look at NFV Execution Models., , and . APNet, page 85-91. ACM, (2019)Network function virtualization enablement within SDN data plane., , , , and . INFOCOM, page 1-9. IEEE, (2017)