Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

G-RCA: a generic root cause analysis platform for service quality management in large IP networks., , , , , and . IEEE/ACM Trans. Netw., 20 (6): 1734-1747 (2012)Wresting Control from BGP: Scalable Fine-Grained Route Control., , , , , and . USENIX Annual Technical Conference, page 295-308. USENIX, (2007)PHAS: A Prefix Hijack Alert System., , , , , and . USENIX Security Symposium, USENIX Association, (2006)FOCUS: Shedding light on the high search response time in the wild., , , , , , , and . INFOCOM, page 1-9. IEEE, (2016)Learning thresholds for PV change detection from operators' labels., , , , , , , , and . IPCCC, page 1-9. IEEE Computer Society, (2015)TowerDefense: Deployment strategies for battling against IP prefix hijacking., , , , and . ICNP, page 134-143. IEEE Computer Society, (2010)The Search for Sparse, Robust Neural Networks., , , and . CoRR, (2019)Why It Takes So Long to Connect to a WiFi Access Point., , , , , , , , and . CoRR, (2017)AdCell: Ad Allocation in Cellular Networks., , , , and . ESA, volume 6942 of Lecture Notes in Computer Science, page 311-322. Springer, (2011)Rapid Deployment of Anomaly Detection Models for Large Number of Emerging KPI Streams., , , , , , and . IPCCC, page 1-8. IEEE, (2018)