Author of the publication

Challenges for Next Generation Network Operations and Service Management: a Report on APNOMS 2008.

, , , , , , and . J. Netw. Syst. Manag., 17 (1-2): 91-98 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New TCAM Architecture for Managing ACL in Routers., , , , and . IEICE Trans. Commun., 93-B (11): 3004-3012 (2010)SeRViTR: A framework, implementation, and a testbed for a trustworthy future Internet., , , , , , , , and . Comput. Networks, (2014)An Automatic Error Identification Method in Call Control Protocol Using Levenshtein Distance., , , , and . ICIN, page 266-273. IEEE, (2020)Towards real-time processing for application identification of encrypted traffic., , , , and . ICNC, page 136-140. IEEE, (2014)Effective bit selection methods for improving performance of packet classifications on IP routers., , , and . GLOBECOM, page 2350-2354. IEEE, (2002)On Inferring Network Impact Factors by Decomposition of Mixed Distribution., , , and . GLOBECOM, IEEE, (2006)Comparisons of Machine Learning Algorithms for Application Identification of Encrypted Traffic., , , , and . ICMLA (2), page 358-361. IEEE Computer Society, (2011)978-0-7695-4607-0.Real-Time Identification of Different TCP Versions., , and . APNOMS, volume 4773 of Lecture Notes in Computer Science, page 215-224. Springer, (2007)Identification of Attack Nodes from Traffic Matrix Estimation., , and . IEICE Trans. Commun., 90-B (10): 2854-2864 (2007)Image Processing Approach to Automatic Scoring System for Archery Targets., , , , , and . IIH-MSP, page 259-262. IEEE, (2013)