Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An image processing approach to traffic anomaly detection., , and . AINTEC, page 17-26. ACM, (2008)Predicting possible conflicts in hierarchical planning for multi-agent systems., , , , and . AAMAS, page 813-820. ACM, (2005)A Visualization Tool for Exploring Multi-scale Network Traffic Anomalies., , and . J. Networks, 6 (4): 577-586 (2011)Fluctuated peer selection policy and its performance in large-scale multi-agent systems., , , , , and . Web Intell. Agent Syst., 8 (3): 255-268 (2010)Policy-based BGP-control architecture for inter-AS routing adjustment., , , and . Comput. Commun., 31 (13): 2996-3002 (2008)A Portable Time Synchronization Method using eBPF., , and . CANDARW, page 20-25. IEEE, (2022)Performance variation due to interference among a large number of self-interested agents., , , and . IEEE Congress on Evolutionary Computation, page 766-773. IEEE, (2007)Capability-Based Egress Network Access Control for Transferring Access Rights., , , , and . ICITA (2), page 488-495. IEEE Computer Society, (2005)Dependency of Network Structures in Agent Selection and Deployment., , , , , and . IAT, page 37-44. IEEE Computer Society, (2006)The Impact of Network Model on Performance of Load-balancing., , , , , and . Emergent Intelligence of Networked Agents, volume 56 of Studies in Computational Intelligence, Springer, (2007)