Author of the publication

Analysis of the Relationship Between Server Location and RTT.

, , , , , and . COMPSAC (1), page 939-942. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research., , , , , , , , , and 1 other author(s). CoRR, (2017)Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage., , , , and . Comput. Secur., (2021)Corrigendum to "Identifying and using driver nodes in temporal networks"., , and . J. Complex Networks, (2020)Studying the Effect of Multi-Query Functionality on a Correlation-Aware SQL-To-MapReduce Translator., and . RIIT, page 55-60. ACM, (2015)Identifying and using driver nodes in temporal networks., , and . J. Complex Networks, 7 (5): 720-748 (2019)A Study of Perceptions, Usability and Future Adoption of a Web-based Learning Tool., , , , and . Int. J. Technol. Diffusion, 5 (3): 69-90 (2014)Answer Comments As Reviews: Predicting Acceptance By Measuring Valence On Stack Exchange., and . IEEE Big Data, page 4782-4791. IEEE, (2022)GLASS: Genomic Literature Area Sequence Search., , and . BIBM Workshops, page 598-599. IEEE Computer Society, (2011)Kernel Level Support for Workflow Patterns., , , and . SERVICES, page 192-199. IEEE Computer Society, (2011)Fighting COVID-19 at Purdue University: Design and Evaluation of a Game for Teaching COVID-19 Hygienic Best Practices., , , , , , , , and . FDG, page 15:1-15:23. ACM, (2021)