From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Approximate Analysis of Arbitrary Open Networks with HOL Priorities and PBS Scheme., и . ESM, стр. 741-746. SCS Europe, (1998)Approximate Analysis of Arbitrary QNMs with Space and Service Priorities., и . Modelling and Evaluation of ATM Networks, том 157 из IFIP Conference Proceedings, стр. 497-521. Kluwer, (1997)A Queueing Model for a Wireless GSM/GPRS Cell with Multiple Service Classes., , и . NETWORKING, том 2345 из Lecture Notes in Computer Science, стр. 984-995. Springer, (2002)Virtualization in Network Intrusion Detection Systems., , , , , и . OTM Workshops, том 5872 из Lecture Notes in Computer Science, стр. 6-8. Springer, (2009)Efficacy of ADDIE Model in Peer-to-Peer Networks: Digital Evidence Investigation., , и . FiCloud, стр. 177-183. IEEE, (2021)An Efficient Routing Mechanism Based on Heading Angle., , , и . AINA Workshops, стр. 199-204. IEEE Computer Society, (2009)High Speed NIDS using Dynamic Cluster and Comparator Logic., , , , , и . CIT, стр. 575-581. IEEE Computer Society, (2010)Performance evaluation of e-commerce requests in wireless cellular networks., и . Inf. Softw. Technol., 48 (6): 393-401 (2006)Stochastic modelling of random early detection based congestion control mechanism for bursty and correlated traffic., , и . IEE Proc. Softw., 151 (5): 240-247 (2004)Machine Learning for Botnet Detection: An Optimized Feature Selection Approach., , , и . ICFNDS, стр. 195-200. ACM, (2021)