Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network pricing: can both ISP and P2P benefit?, and . Int. Journal of Network Management, 24 (6): 433-449 (2014)Fighting botnets with economic uncertainty., , , and . Security and Communication Networks, 4 (10): 1104-1113 (2011)Could firewall rules be public - a game theoretical perspective., , and . Security and Communication Networks, 5 (2): 197-210 (2012)Connections Between Spectral Properties of Asymptotic Mappings and Solutions to Wireless Network Problems., , and . IEEE Trans. Signal Processing, 67 (10): 2747-2760 (2019)3D anomaly bar visualization for large-scale network: VAST 2012 Mini Challenge #1., , and . IEEE VAST, page 291-292. IEEE Computer Society, (2012)SAVE: Sensor anomaly visualization engine., , , , , and . IEEE VAST, page 201-210. IEEE Computer Society, (2011)A distributed interference-aware load balancing algorithm for LTE multi-cell networks., , and . WSA, page 28-35. IEEE, (2012)Optical Interconnects between Microprocessor and Memories., , , , , , , and . HPCC/CSS/ICESS, page 912-915. IEEE, (2014)Analysis of offense tactics of basketball games using link prediction., , and . ICIS, page 207-212. IEEE Computer Society, (2013)A Survey of Anticipatory Mobile Networking: Context-Based Classification, Prediction Methodologies, and Optimization Techniques., , , , , and . IEEE Communications Surveys and Tutorials, 19 (3): 1790-1821 (2017)