Author of the publication

A highly scalable bandwidth estimation of commercial hotspot access points.

, , , and . INFOCOM, page 1143-1151. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A System Demonstration of ST-TCP., , and . DSN, page 308-313. IEEE Computer Society, (2005)MapReduce System over Heterogeneous Mobile Devices., , and . SEUS, volume 5860 of Lecture Notes in Computer Science, page 168-179. Springer, (2009)Efficient misbehaving user detection in online video chat services., , , , , , and . WSDM, page 23-32. ACM, (2012)An analysis of positivity and negativity attributes of users in twitter., and . ASONAM, page 365-370. IEEE Computer Society, (2014)Are they Our Brothers? Analysis and Detection of Religious Hate Speech in the Arabic Twittersphere., , and . ASONAM, page 69-76. IEEE Computer Society, (2018)Enhanced server fault-tolerance for improved user experience., , and . DSN, page 167-176. IEEE Computer Society, (2008)Communication and Synchronization Models in Mobile Agent-Based Computing Systems., and . ISCA PDCS, page 442-447. ISCA, (2001)Power Based Malicious Code Detection Techniques for Smartphones., and . TrustCom/ISPA/IUCC, page 142-149. IEEE Computer Society, (2013)Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks., , and . SecureComm, page 113-126. IEEE, (2005)A Flexible and Intrusion Tolerant Voting Mechanism.. Computers and Their Applications, page 265-270. ISCA, (2005)