Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accurate and effective inference of network link loss from unicast end-to-end measurements., and . IET Communications, 6 (17): 2989-2997 (2012)GARCH model-based large-scale IP traffic matrix estimation., and . IEEE Communications Letters, 13 (1): 52-54 (2009)NCGs: Building a Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis., , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 67-78. Springer, (2019)Improving the accuracy of boolean tomography by exploiting path congestion degrees., , , and . ISCC, page 725-731. IEEE Computer Society, (2012)Temporal Dependence Network Link Loss Inference from Unicast End-to-End Measurements., and . IEICE Transactions, 95-B (6): 1974-1977 (2012)Recurrent Neural Network Inference of Internal Delays in Nonstationary Data Network., , , and . ISNN (2), volume 3973 of Lecture Notes in Computer Science, page 190-195. Springer, (2006)Network Topology Tomography Under Multipath Routing., , , , and . IEEE Communications Letters, 20 (3): 550-553 (2016)Identification of congestion links under multipath routing with end-to-end measurements., , , and . ISCC, page 646-650. IEEE Computer Society, (2016)Real-Time Identification of Users under the New Structure of Skype., , and . SECON Workshops, page 1-6. IEEE, (2016)Identify Congested Links Based on Enlarged State Space., , , , and . J. Comput. Sci. Technol., 31 (2): 350-358 (2016)