Author of the publication

A Study of Burstiness in TCP Flows.

, , and . PAM, volume 3431 of Lecture Notes in Computer Science, page 13-26. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Workshop on Internet Economics (WIE 2019) report., and . Comput. Commun. Rev., 50 (2): 53-59 (2020)Tracking IPv6 evolution: data we have and data we need.. Comput. Commun. Rev., 41 (3): 43-48 (2011)The 3rd workshop on active internet measurements (AIMS-3) report.. Comput. Commun. Rev., 41 (3): 37-42 (2011)Follow the Scent: Defeating IPv6 Prefix Rotation Privacy., , and . CoRR, (2021)Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet., , , , , and . CCS, page 465-480. ACM, (2019)Analysis of a "/0" stealth scan from a botnet., , , , and . Internet Measurement Conference, page 1-14. ACM, (2012)Challenges in Inferring Internet Interdomain Congestion., , , , and . Internet Measurement Conference, page 15-22. ACM, (2014)Leveraging Internet Background Radiation for Opportunistic Network Analysis., , , , and . Internet Measurement Conference, page 423-436. ACM, (2015)A Study of Burstiness in TCP Flows., , and . PAM, volume 3431 of Lecture Notes in Computer Science, page 13-26. Springer, (2005)Toward Topology Dualism: Improving the Accuracy of AS Annotations for Routers., , , and . PAM, volume 6032 of Lecture Notes in Computer Science, page 101-110. Springer, (2010)