Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study of the Energy Consumption of Android Applications., , , and . ICSME, page 121-130. IEEE Computer Society, (2014)Embedded IoT Systems: Network, Platform, and Software., , , and . Mobile Information Systems, (2017)Estimating Android applications' CPU energy usage via bytecode profiling., , , and . GREENS, page 1-7. IEEE Computer Society, (2012)Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO., , , , , , and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 263-284. Springer, (2021)Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services., , , and . DSN, page 362-373. IEEE Computer Society, (2018)Personal data vaults: a locus of control for personal data streams., , , , , , , and . CoNEXT, page 17. ACM, (2010)Snooze: energy management in 802.11n WLANs., , , and . CoNEXT, page 12. ACM, (2011)Exploring Domain Name Based Features on the Effectiveness of DNS Caching., and . Comput. Commun. Rev., 47 (1): 36-42 (2017)E3MC: Improving Energy Efficiency via Elastic Multi-Controller SDN in Data Center Networks., , , , , and . IEEE Access, (2016)ABR streaming of VBR-encoded videos: characterization, challenges, and solutions., , , , , , and . CoNEXT, page 366-378. ACM, (2018)