Author of the publication

Approximate Analysis of Arbitrary QNMs with Space and Service Priorities.

, and . Modelling and Evaluation of ATM Networks, volume 157 of IFIP Conference Proceedings, page 497-521. Kluwer, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficacy of ADDIE Model in Peer-to-Peer Networks: Digital Evidence Investigation., , and . FiCloud, page 177-183. IEEE, (2021)High Speed NIDS using Dynamic Cluster and Comparator Logic., , , , , and . CIT, page 575-581. IEEE Computer Society, (2010)An Efficient Routing Mechanism Based on Heading Angle., , , and . AINA Workshops, page 199-204. IEEE Computer Society, (2009)Virtualization in Network Intrusion Detection Systems., , , , , and . OTM Workshops, volume 5872 of Lecture Notes in Computer Science, page 6-8. Springer, (2009)A Queueing Model for a Wireless GSM/GPRS Cell with Multiple Service Classes., , and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 984-995. Springer, (2002)Approximate Analysis of Arbitrary QNMs with Space and Service Priorities., and . Modelling and Evaluation of ATM Networks, volume 157 of IFIP Conference Proceedings, page 497-521. Kluwer, (1997)Approximate Analysis of Arbitrary Open Networks with HOL Priorities and PBS Scheme., and . ESM, page 741-746. SCS Europe, (1998)Machine Learning for Botnet Detection: An Optimized Feature Selection Approach., , , and . ICFNDS, page 195-200. ACM, (2021)Performance Analysis of Congestion Control Mechanism Using Queue Thresholds Under Bursty Traffic., , and . ECUMN, volume 3262 of Lecture Notes in Computer Science, page 307-316. Springer, (2004)Performance Analysis of GSM Cells with Re-Use Partitioning., , , and . ESM, page 494-504. SCS Europe, (2002)