Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The effect of burst formation timers on video streaming over optical burst switched networks., , , and . BROADNETS, page 282-289. IEEE, (2008)KISS Methodologies for Network Management and Anomaly Detection., , and . SoftCOM, page 1-6. IEEE, (2018)Duplicate detection methodology for IP network traffic analysis., , , and . M&N, page 161-166. IEEE, (2013)Strategies for the interconnection of heterogeneous optical networks., , , , , , , , , and 1 other author(s). ICTON, page 1-4. IEEE, (2014)Evaluation of RTT as an Estimation of Interactivity Time for QoE Evaluation in Remote Desktop Environments., , , and . ITNAC, page 240-245. IEEE, (2023)Alias resolution techniques: long-term analysis of alias stability in internet routers., , , and . PM2HW2N@MSWiM, page 5-12. ACM, (2013)Traffic estimation in high-speed communication networks using fuzzy systems., , and . EUSFLAT Conf., page 97-100. De Montfort University, Leicester, UK, (2001)Techniques for better alias resolution in Internet topology discovery., , , and . Integrated Network Management, page 513-520. IEEE, (2009)Effective Analysis of Secure Web Response Time., , , and . TMA, page 145-152. IEEE, (2019)On the performance and improvement of alias resolution methods for Internet core networks., , , and . Ann. des Télécommunications, 66 (1-2): 31-43 (2011)