Author of the publication

Constructing traffic-aware overlay topologies: a machine learning approach.

, and . IPTPS, page 17. USENIX, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reward only is not enough: Evaluating and improving the fairness policy of the P2P file sharing network eMule/eDonkey., , and . Peer-to-Peer Networking and Applications, 5 (1): 40-57 (2012)Multicast algorithms in service overlay networks., , and . Computer Communications, 31 (3): 489-505 (2008)Optimizing quarantine regions through ellipsoidal geographic networks., , and . Computers & Industrial Engineering, (2015)On graph-based characteristics of optimal overlay topologies., and . Computer Networks, 53 (7): 913-925 (2009)Optimal Mobility Pattern in Epidemic Networks., and . GLOBECOM, page 1-6. IEEE, (2009)Optimal filtering in traffic estimation for bandwidth brokers., , , , , and . GLOBECOM, page 3636-3640. IEEE, (2003)Placement of distributed generation using electrical measures to improve the robustness of power grid networks., , and . IJCIS, 11 (4): 345-364 (2015)Constructing traffic-aware overlay topologies: a machine learning approach., and . IPTPS, page 17. USENIX, (2008)Size-based flow management prototype for dynamic DMZ., , , , and . DRCN, page 191-196. IEEE, (2015)Shipboard Power Systems Reconfiguration - A Cyber-Physical Framework For Response Time Analysis., , , , , and . IEEE Trans. Industrial Informatics, 10 (1): 439-449 (2014)