Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A scalable approach to IP anycast security., and . Communication, Network, and Information Security, page 179-184. IASTED/ACTA Press, (2006)Using Proximity Information for Load Balancing in Geographically Distributed Web Server Systems., , and . EurAsia-ICT, volume 2510 of Lecture Notes in Computer Science, page 659-666. Springer, (2002)DTP: An Efficient Transport Protocol., and . NETWORKS, volume C-13 of IFIP Transactions, page 171-180. North-Holland, (1992)DDoS/EDoS attack in cloud: affecting everyone out there!, , and . SIN, page 169-176. ACM, (2015)WebCaL - a domain specific language for web caching., , , , , , and . Comput. Commun., 24 (2): 191-201 (2001)Location determination of a mobile device using IEEE 802.11b access point signals., , , and . WCNC, page 1987-1992. IEEE, (2003)A testbed for performance evaluation of load-balancing strategies for Web server systems., , , , and . Softw. Pract. Exp., 34 (4): 339-353 (2004)A code allocation protocol for maximizing throughput in CDMA based ad hoc networks., , , and . WCNC, page 1385-1390. IEEE, (2003)Study of Network Dynamics., , and . Computer Networks and ISDN Systems, 26 (3): 371-378 (1993)DDoS attacks in cloud computing: Collateral damage to non-targets., , , and . Comput. Networks, (2016)