Author of the publication

TBI: End-to-End Network Performance Measurement Testbed for Empirical Bottleneck Detection.

, , , and . TRIDENTCOM, page 290-298. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ontology-Based Semantic Priority Scheduling for Multi-domain Active Measurements., , , and . J. Netw. Syst. Manag., 22 (3): 331-365 (2014)Discovering last-matching rules in popular open-source and commercial firewalls., , , , and . Int. J. Internet Protoc. Technol., 5 (1/2): 23-31 (2010)vSocial: a cloud-based system for social virtual reality learning environment applications in special education., , , , , , and . Multim. Tools Appl., 80 (11): 16827-16856 (2021)Fuzzy-Based Conversational Recommender for Data-intensive Science Gateway Applications., , , , , , and . IEEE BigData, page 4870-4875. IEEE, (2018)Fuzzy-Engineered Multi-Cloud Resource Brokering for Data-intensive Applications., , , and . CCGRID, page 257-266. IEEE, (2021)Data-Driven Edge Computing Resource Scheduling for Protest Crowds Incident Management., , , , , and . NCA, page 1-8. IEEE, (2018)Data integrity protection through security monitoring for just-in-time news feeds., , , and . CloudNet, page 184-190. IEEE, (2015)PCA-based network-wide correlated anomaly event detection and diagnosis., , , and . DRCN, page 149-156. IEEE, (2015)Semantic scheduling of active measurements for meeting network monitoring objectives., , and . CNSM, page 435-438. IEEE, (2010)TruVR: Trustworthy Cybersickness Detection using Explainable Machine Learning., , , and . ISMAR, page 777-786. IEEE, (2022)