Author of the publication

Screen-off traffic characterization and optimization in 3G/4G networks.

, , , , and . Internet Measurement Conference, page 357-364. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Screen-off traffic characterization and optimization in 3G/4G networks., , , , and . Internet Measurement Conference, page 357-364. ACM, (2012)RadioProphet: Intelligent Radio Resource Deallocation for Cellular Networks., , , , and . PAM, volume 8362 of Lecture Notes in Computer Science, page 1-11. Springer, (2014)An in-depth study of LTE: effect of network protocol and application behavior on performance., , , , , , , and . SIGCOMM, page 363-374. ACM, (2013)ABPP: An Adaptive Beacon Scheme for Geographic Routing in FANET., and . PDCAT, page 293-299. IEEE Computer Society, (2017)Nondestructive in-ovo sexing of Hy-Line Sonia eggs by EggFormer using hyperspectral imaging., , , , , , , and . Comput. Electron. Agric., (2024)Deception Detection Via Blob Motion Pattern Analysis., , and . ACII, volume 4738 of Lecture Notes in Computer Science, page 727-728. Springer, (2007)Web caching on smartphones: ideal vs. reality., , , , , , , and . MobiSys, page 127-140. ACM, (2012)Performance and Power Characterization of Cellular Networks and Mobile Application Optimizations.. University of Michigan, USA, (2013)How to Reduce Smartphone Traffic Volume by 30%?, , , , , and . PAM, volume 7799 of Lecture Notes in Computer Science, page 42-52. Springer, (2013)Innocent by association: early recognition of legitimate users., , , , , , , , and . CCS, page 353-364. ACM, (2012)