Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Active Network Based DDoS Defense., , , , , , , and . DANCE, page 193-203. IEEE Computer Society, (2002)A General Cooperative Intrusion Detection Architecture for MANETs., , , , , , , , , and 1 other author(s). IWIA, page 57-70. IEEE Computer Society, (2005)Interactive Multi-volume Visualization., , and . International Conference on Computational Science (2), volume 2330 of Lecture Notes in Computer Science, page 102-110. Springer, (2002)When is service really denied?: a user-centric dos metric., , , , , , , and . SIGMETRICS, page 357-358. ACM, (2007)Rendering complexity in computer-generated pen-and-ink illustrations., and . NPAR, page 129-137. ACM, (2004)SEER: A Security Experimentation EnviRonment for DETER., , and . DETER, USENIX Association, (2007)Towards user-centric metrics for denial-of-service measurement., , , , , , , and . Experimental Computer Science, page 8. ACM, (2007)High-Quality Lighting for Pre-Integrated Volume Rendering., , and . VisSym, page 25-34. Eurographics Association, (2004)Squarewave frequency modulation techniques., , and . IEEE Trans. Communications, 43 (234): 1505-1512 (1995)A hardware-assisted hybrid rendering technique for interactive volume visualization., , and . VolVis, page 123-130. IEEE Computer Society, (2002)