Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Profiling resource usage for mobile applications: a cross-layer approach., , , , , and . MobiSys, page 321-334. ACM, (2011)Multilevel cooperative on-line computing architecture under dispatching cloud., , , , and . IECON, page 339-344. IEEE, (2017)Interactive project review of deformable parts through haptic interfaces in Virtual Reality.. University of Rennes 1, France, (2011)Accurate online power estimation and automatic battery behavior based power model generation for smartphones., , , , , , and . CODES+ISSS, page 105-114. ACM, (2010)An untold story of middleboxes in cellular networks., , , , and . SIGCOMM, page 374-385. ACM, (2011)Demo: mobile application resource optimizer (ARO)., , , , , and . MobiSys, page 369-370. ACM, (2011)Characterizing radio resource allocation for 3G networks., , , , , and . Internet Measurement Conference, page 137-150. ACM, (2010)Cellular data network infrastructure characterization and implication on mobile content placement., , , , , and . SIGMETRICS, page 317-328. ACM, (2011)TOP: Tail Optimization Protocol For Cellular Radio Resource Allocation., , , , , and . ICNP, page 285-294. IEEE Computer Society, (2010)You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks., , , , , and . NDSS, The Internet Society, (2012)