Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fingerprint-based Bloom Filter with Deletion Capabilities., , , and . EuCNC, page 453-458. IEEE, (2019)What Can Ail Thee: New and Old Security Vulnerabilities of Wireless Datacenters., , , , and . GLOBECOM, page 1-7. IEEE, (2020)Vulnerabilities of the Real-Time Transport (RTP) Protocol for Voice over IP (VoIP) Traffic., and . CCNC, page 1-5. IEEE, (2009)Predictable Internet Clients and In-Switch Deep Packet Inspection., , , and . ICCCN, page 1-10. IEEE, (2023)Experience with Software Watermarking., , , , , and . ACSAC, page 308-316. IEEE Computer Society, (2000)Use of Network Latency Profiling and Redundancy for Cloud Server Selection., , , , , and . IEEE CLOUD, page 826-832. IEEE Computer Society, (2014)Integrating highly-capable corobots into a computing curriculum., , and . FIE, page 1173-1175. IEEE Computer Society, (2013)Designing and characterizing overlay networks. Purdue University, USA, (2004)Characterizing overlay multicast networks and their costs, and . IEEE/ACM Trans. Netw., 15 (2): 373--386 (2007)Adaptable Multi-Domain Language Model for Transformer ASR., , , , , , , , , and 3 other author(s). ICASSP, page 7358-7362. IEEE, (2021)