Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Origin of critical behavior in Ethernet traffic, , and . Physica A: Statistical Mechanics and its Applications, 287 (1-2): 289--301 (Nov 15, 2000)Probabilistic Award Strategy for Contract Net Protocol in Massively Multi-agent Systems., , and . ICAART (2), page 165-171. INSTICC Press, (2010)MALAWI: aggregated longitudinal analysis of the MAWI dataset., and . StudentWorkshop@CoNEXT, page 2:1-2:2. ACM, (2011)A Measurement of Mobile Traffic Offloading., and . PAM, volume 7799 of Lecture Notes in Computer Science, page 73-82. Springer, (2013)Strip, bind, and search: a method for identifying abnormal energy consumption in buildings., , , , , , , and . IPSN, page 129-140. ACM, (2013)Counting NATted hosts by observing TCP/IP field behaviors., , and . ICC, page 1265-1270. IEEE, (2012)A fully meshed backbone network for data-intensive sciences and SDN services., , , , , , , , , and 1 other author(s). ICUFN, page 909-911. IEEE, (2016)Dynamics of temporal correlation in daily Internet traffic., , and . GLOBECOM, page 4069-4073. IEEE, (2003)A longitudinal analysis of Internet rate limitations., , , , and . INFOCOM, page 1438-1446. IEEE, (2014)Traffic Matrix Estimation Using Spike Flow Detection., , , and . IEICE Trans. Commun., 88-B (4): 1484-1492 (2005)