Author of the publication

Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It.

, , , and . ICNP, page 263-272. IEEE Computer Society, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gaussian Extremality for Derivatives of Differential Entropy under the Additive Gaussian Noise Flow., , and . ISIT, page 1605-1609. IEEE, (2018)Hybrid Behavior Coordination Mechanism for Navigation of Reconnaissance Robot., , and . IROS, page 1773-1778. IEEE, (2006)Recognizing Voice-Based Requirements to Drive Self-Adaptive Software Systems., , , and . COMPSAC Workshops, page 534-539. IEEE Computer Society, (2016)Auxiliary Means to Improve Motion Guidance Memorability in Extended Reality, , , , , , and . 2023 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), page 689-690. (March 2023)Aptamer-Modified Semiconductor Quantum Dots for Biosensing Applications., , , , and . Sensors, 17 (8): 1736 (2017)Txilm: Lossy Block Compression with Salted Short Hashing., , , , , and . IACR Cryptology ePrint Archive, (2019)Gaussian Optimality for Derivatives of Differential Entropy Using Linear Matrix Inequalities., , and . Entropy, 20 (3): 182 (2018)Three-dimensional (3D) CAD model lightweight scheme for large-scale assembly and simulation., , , and . Int. J. Computer Integrated Manufacturing, 28 (5): 520-533 (2015)Ship Hydrodynamic Pressure Signal Detection Based on Neural Network Prediction., and . WGEC, page 469-471. IEEE Computer Society, (2009)THash: A Practical Network Optimization Scheme for DHT-based P2P Applications., , , , , and . IEEE Journal on Selected Areas in Communications, 31 (9-Supplement): 379-390 (2013)