Author of the publication

Deterministic Finite Automaton for scalable traffic identification: The power of compressing by range.

, , , , and . NOMS, page 155-162. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Sadok, Djamel
add a person with the name Sadok, Djamel
 

Other publications of authors with the same name

An Analytical View of Multiple CDNs Collaboration., , , and . AINA, page 25-32. IEEE Computer Society, (2014)Unleashing the power of policies for service-oriented computing., , , , , and . CNSM, page 1-5. IEEE, (2011)Most Wanted Internet Applications: A Framework for P2P Identification., , , and . CNSR, page 341-347. IEEE Computer Society, (2010)DBuffer: A state machine oriented control system for DASH., , , , and . ISCC, page 861-867. IEEE Computer Society, (2016)Characterizing signature sets for testing DPI systems., , , and . GLOBECOM Workshops, page 678-683. IEEE, (2011)Chameleon: an Architecture for Advanced End to End Services., and . LANOMS, page 245-256. UFMG, (2001)On the Use of Peer-to-Peer Architectures for the Management of Highly Dynamic Environments., , , , and . PerCom Workshops, page 135-140. IEEE Computer Society, (2006)Assessing the effectiveness of automated service composition., , , and . J. Braz. Comp. Soc., 22 (1): 6:1-6:13 (2016)3D routing: a protocol for emergency scenarios., , , , and . IWCMC, page 519-523. ACM, (2010)E2ECloud: Composition and execution of end-to-end services in the cloud., , , , , , and . ISCC, page 1-6. IEEE Computer Society, (2014)