Author of the publication

A new structure-preserving method of sampling for predicting self-similar traffic.

, , , and . Telecommun. Syst., 43 (3-4): 265-277 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UAV-GCS Centralized Data-Oriented Communication Architecture for Crowd Surveillance Applications., , , and . IWCMC, page 2064-2069. IEEE, (2019)Security issues of m-commerce over hotspot networks., , , and . WCNC, page 837-838. IEEE, (2004)A Hierarchical distributed communication architecture for real-time auctions., , and . ICETE, page 5-15. INSTICC Press, (2005)Router Queue Management for Multimedia Traffic in the Internet., , and . Networking and Information Systems, 2 (1): 47-62 (1999)An Ontology-Based Model for a Context-Aware Service Oriented Architecture., , , , and . Software Engineering Research and Practice, page 608-612. CSREA Press, (2007)OLSR based peer to peer instant messaging for Ad-hoc networks., , and . Med-Hoc-Net, page 1-8. IEEE, (2010)Design and preliminary study of the W-PRDR: a new congestion control scheme for wireless networks., , and . SimuTools, page 9. ICST/ACM, (2008)Traffic Anomaly Detection and Characterization in the Tunisian National University Network., , and . Networking, volume 3976 of Lecture Notes in Computer Science, page 136-147. Springer, (2006)Sleep/Wakeup and TDMA Scheduling Access Protocols in Sensor Networks: A Survey., , and . ICWN, page 625-631. CSREA Press, (2009)Distributed denial-of-service attack detection scheme-based joint-entropy., , and . Secur. Commun. Networks, 5 (9): 1049-1061 (2012)