Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme., , , and . Computer Networks, 46 (2): 253-272 (2004)Analysis of point-to-point packet delay in an operational network., , , , and . Computer Networks, 51 (13): 3812-3827 (2007)Quantile sampling for practical delay monitoring in Internet backbone networks., , , , and . Computer Networks, 51 (10): 2701-2716 (2007)Packet Audio Playout Delay Adjustment: Performance Bounds and Algorithms., , and . Multimedia Syst., 6 (1): 17-28 (1998)Modeling and predicting the popularity of online contents with Cox proportional hazard regression model., , and . Neurocomputing, 76 (1): 134-145 (2012)Path Protection Routing with SRLG Constraints to Support IPTV in WDM Mesh Networks., , , , and . INFOCOM, IEEE, (2006)Accelerating SSL with GPUs., , , , and . Computer Communication Review, 41 (1): 135-139 (2011)An Educational Networking Framework for Full Layer Implementation and Testing., , and . SIGCSE, page 663-668. ACM, (2015)Analysis of topological characteristics of huge online social networking services., , , , and . WWW, page 835-844. ACM, (2007)On the design and performance of prefix-preserving IP traffic trace anonymization., , , and . Internet Measurement Workshop, page 263-266. ACM, (2001)