From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using graphic turing tests to counter automated DDoS attacks against web servers., , , , , и . ACM Conference on Computer and Communications Security, стр. 8-19. ACM, (2003)Distributed link scheduling in wireless networks., , , и . Discret. Math. Algorithms Appl., 12 (5): 2050058:1-2050058:43 (2020)WebSOS: protecting web servers from DDoS attacks., , , , и . ICON, стр. 461-466. IEEE, (2003)ECN or Delay: Lessons Learnt from Analysis of DCQCN and TIMELY., , , и . CoNEXT, стр. 313-327. ACM, (2016)Brief announcement: strong detection of misconfigurations., , и . PODC, стр. 40. ACM, (2005)Self-similarity and long range dependence on the internet: a second look at the evidence, origins and implications ., , , и . Comput. Networks, 48 (3): 377-399 (2005)Throughput differentiation using coloring at the network edge and preferential marking at the core., , , , , и . IEEE/ACM Trans. Netw., 13 (4): 743-754 (2005)TCP Networks Stabilized by Buffer-Based AQMs., , , и . INFOCOM, стр. 964-974. IEEE, (2004)Optimal state-free, size-aware dispatching for heterogeneous M/G/-type systems., , и . Perform. Evaluation, 62 (1-4): 475-492 (2005)On the Optimality of Greedy Garbage Collection for SSDs., , и . SIGMETRICS Perform. Evaluation Rev., 43 (2): 63-65 (2015)