Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Personal Cloud Storage Benchmarks and Comparison., , and . IEEE Trans. Cloud Comput., 5 (4): 751-764 (2017)A Study of Costs and Benefits of Content Sharing in Personal Cloud Storage., , , , and . J. Netw. Syst. Manag., 29 (3): 30 (2021)A Survey on Big Data for Network Traffic Monitoring and Analysis., , , , and . CoRR, (2020)Five Years at the Edge: Watching Internet From the ISP Network., , , , and . IEEE/ACM Trans. Netw., 28 (2): 561-574 (2020)Analysing Costs and Benefits of Content Sharing in Cloud Storage., , , , and . LANCOMM@SIGCOMM, page 43-45. ACM, (2016)RL-IoT: Reinforcement Learning to Interact with IoT Devices., , , and . COINS, page 1-6. IEEE, (2021)Measuring the Performance of iCloud Private Relay., , , and . PAM, volume 13882 of Lecture Notes in Computer Science, page 3-17. Springer, (2023)PAIN: A Passive Web performance indicator for ISPs., , and . Comput. Networks, (2019)LogPrécis: Unleashing Language Models for Automated Shell Log Analysis., , , , , , and . CoRR, (2023)Sound-skwatter (Did You Mean: Sound-squatter?) AI-powered Generator for Phishing Prevention., , , and . CoRR, (2023)