Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MIDAS: An Impact Scale for DDoS attacks., , , and . LANMAN, page 200-205. IEEE, (2007)A Heartbeat Mechanism and Its Application in Gigascope., , , and . VLDB, page 1079-1088. ACM, (2005)An in-depth study of LTE: effect of network protocol and application behavior on performance., , , , , , , and . SIGCOMM, page 363-374. ACM, (2013)Navigation characteristics of online social networks and search engines users., , , and . WOSN, page 43-48. ACM, (2012)Optimizing TCP forwarder performance., , , and . IEEE/ACM Trans. Netw., 8 (2): 146-157 (2000)Characterizing resource usage for mobile web browsing., , and . MobiSys, page 218-231. ACM, (2014)Screen-off traffic characterization and optimization in 3G/4G networks., , , , and . Internet Measurement Conference, page 357-364. ACM, (2012)TM3: flexible <u>t</u>ransport-layer <u>m</u>ulti-pipe <u>m</u>ultiplexing <u>m</u>iddlebox without head-of-line blocking., , , , and . CoNEXT, page 3:1-3:13. ACM, (2015)Accurate, scalable in-network identification of p2p traffic using application signatures., , and . WWW, page 512-521. ACM, (2004)RadioProphet: Intelligent Radio Resource Deallocation for Cellular Networks., , , , and . PAM, volume 8362 of Lecture Notes in Computer Science, page 1-11. Springer, (2014)