Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wireless access server for quality of service and location based access control in 802.11 networks., , and . ISCC, page 819-824. IEEE Computer Society, (2002)Integrating Goal Specification in Policy-Based Management., , and . POLICY, volume 1995 of Lecture Notes in Computer Science, page 153-170. Springer, (2001)Learning URL patterns for webpage de-duplication., , , , , and . WSDM, page 381-390. ACM, (2010)Can I add a VoIP call?, and . ICC, page 779-783. IEEE, (2003)Subband Analysis for Performance Improvement of Replay Attack Detection in Speaker Verification Systems., , and . ISBA, page 1-7. IEEE, (2019)SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments., , , , and . DSN, page 433-442. IEEE Computer Society, (2004)Proxy-RED: An AQM Scheme for Wireless Local Area Networks., , , and . ICCCN, page 460-465. IEEE, (2004)Relevance-index size tradeoff in contextual advertising., , , and . CIKM, page 1721-1724. ACM, (2010)Topology Construction for Rural Wireless Mesh Networks - A Geometric Approach., and . ICCSA (3), volume 6784 of Lecture Notes in Computer Science, page 107-120. Springer, (2011)Learning website hierarchies for keyword enrichment in contextual advertising., , , and . WSDM, page 425-434. ACM, (2011)