Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TM3: flexible <u>t</u>ransport-layer <u>m</u>ulti-pipe <u>m</u>ultiplexing <u>m</u>iddlebox without head-of-line blocking., , , , and . CoNEXT, page 3:1-3:13. ACM, (2015)Screen-off traffic characterization and optimization in 3G/4G networks., , , , and . Internet Measurement Conference, page 357-364. ACM, (2012)Characterizing resource usage for mobile web browsing., , and . MobiSys, page 218-231. ACM, (2014)Accurate, scalable in-network identification of p2p traffic using application signatures., , and . WWW, page 512-521. ACM, (2004)RadioProphet: Intelligent Radio Resource Deallocation for Cellular Networks., , , , and . PAM, volume 8362 of Lecture Notes in Computer Science, page 1-11. Springer, (2014)MIDAS: An Impact Scale for DDoS attacks., , , and . LANMAN, page 200-205. IEEE, (2007)Navigation characteristics of online social networks and search engines users., , , and . WOSN, page 43-48. ACM, (2012)An in-depth study of LTE: effect of network protocol and application behavior on performance., , , , , , , and . SIGCOMM, page 363-374. ACM, (2013)Optimizing TCP forwarder performance., , , and . IEEE/ACM Trans. Netw., 8 (2): 146-157 (2000)A Heartbeat Mechanism and Its Application in Gigascope., , , and . VLDB, page 1079-1088. ACM, (2005)