Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A user-friendly self-similarity analysis tool., , and . Comput. Commun. Rev., 33 (3): 81-93 (2003)Link Homophily in the Application Layer and its Usage in Traffic Classification., , , and . INFOCOM, page 221-225. IEEE, (2010)Scalable Ad Hoc Routing: The Case for Dynamic Addressing., , and . INFOCOM, page 1108-1119. IEEE, (2004)HyperMan: detecting misbehavior in online forums based on hyperlink posting behavior., , , and . Soc. Netw. Anal. Min., 12 (1): 111 (2022)RARE: A Systematic Augmented Router Emulation for Malware Analysis., , , , and . PAM, volume 10771 of Lecture Notes in Computer Science, page 60-72. Springer, (2018)The case for a systematic approach to wireless mobile network simulation., , and . J. High Speed Networks, 14 (3): 243-262 (2005)Using statistical data for reliable mobile communications., , , and . Wirel. Commun. Mob. Comput., 2 (1): 101-111 (2002)RecTen: A Recursive Hierarchical Low Rank Tensor Factorization Method to Discover Hierarchical Patterns in Multi-modal Data., , , and . CoRR, (2020)SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHub., , , , and . RAID, page 149-163. USENIX Association, (2020)Aggregated Multicast for Scalable QoS Multicast Provisioning., , , and . IWDC, volume 2170 of Lecture Notes in Computer Science, page 295-308. Springer, (2001)