Author of the publication

A SVM Method for P2P Traffic Identification based on Multiple Traffic Mode.

, , , , , and . JNW, 5 (11): 1381-1388 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LEACH-G: an Optimal Cluster-heads Selection Algorithm based on LEACH., , , and . JSW, 8 (10): 2660-2667 (2013)Automated Trust Negotiation Model based on Dynamic Game of Incomplete Information., , , , and . JSW, 8 (10): 2668-2674 (2013)Deep linear discriminant analysis hashing for image retrieval., , , , , and . Multimedia Tools Appl., 78 (11): 15101-15119 (2019)Pinning controllability of autonomous Boolean control networks., , and . SCIENCE CHINA Information Sciences, 59 (7): 070107:1-070107:14 (2016)A meta-optimized hybrid global and local algorithm for well placement optimization., , , , , , and . Comput. Chem. Eng., (2018)Texture image classification based on support vector machine and bat algorithm., , , , and . IDAACS, page 309-314. IEEE, (2015)A dynamically event-triggered approach to recursive filtering with censored measurements and parameter uncertainties., , , and . J. Franklin Institute, 356 (15): 8870-8889 (2019)A SVM Method for P2P Traffic Identification based on Multiple Traffic Mode., , , , , and . JNW, 5 (11): 1381-1388 (2010)A LRU-Based Query Algorithm for Gnutella Networks., , and . Control and Intelligent Systems, (2014)Applying Bayesian Trust Sampling to P2P Traffic Inspection., , , and . Control and Intelligent Systems, (2015)