Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme., , , and . Computer Networks, 46 (2): 253-272 (2004)Analysis of point-to-point packet delay in an operational network., , , , and . Computer Networks, 51 (13): 3812-3827 (2007)Quantile sampling for practical delay monitoring in Internet backbone networks., , , , and . Computer Networks, 51 (10): 2701-2716 (2007)Packet Audio Playout Delay Adjustment: Performance Bounds and Algorithms., , and . Multimedia Syst., 6 (1): 17-28 (1998)Path Protection Routing with SRLG Constraints to Support IPTV in WDM Mesh Networks., , , , and . INFOCOM, IEEE, (2006)Modeling and predicting the popularity of online contents with Cox proportional hazard regression model., , and . Neurocomputing, 76 (1): 134-145 (2012)Accelerating SSL with GPUs., , , , and . Computer Communication Review, 41 (1): 135-139 (2011)PacketShader: a GPU-accelerated software router., , , and . SIGCOMM, page 195-206. ACM, (2010)Accelerating SSL with GPUs., , , , and . SIGCOMM, page 437-438. ACM, (2010)Synchronized Two-Way Voice Simulation Tool for Internet Phone Performance Analysis and Evaluation., , and . Computer Performance Evaluation, volume 1245 of Lecture Notes in Computer Science, page 108-122. Springer, (1997)