Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

mRSC: Multidimensional Robust Synthetic Control., , , and . SIGMETRICS (Abstracts), page 55-56. ACM, (2019)PBS: a unified priority-based scheduler., , and . SIGMETRICS, page 203-214. ACM, (2007)A self-tuning structure for adaptation in TCP/AQM networks., , , and . SIGMETRICS, page 302-303. ACM, (2003)Fluid-based analysis of a network of AQM routers supporting TCP flows with an application to RED., , and . SIGCOMM, page 151-160. ACM, (2000)WebSOS: protecting web servers from DDoS attacks., , , , and . ICON, page 461-466. IEEE, (2003)Fixed and adaptive model-based controllers for active queue management., , , , , and . ACC, page 2981-2986. IEEE, (2001)Efficient interpretation of tabular documents., , and . ICPR, page 681-685. IEEE Computer Society, (1996)Distributed link scheduling in wireless networks., , , and . Discret. Math. Algorithms Appl., 12 (5): 2050058:1-2050058:43 (2020)BBRvl vs BBRv2: Examining Performance Differences through Experimental Evaluation., , , and . LANMAN, page 1-6. IEEE, (2020)Using graphic turing tests to counter automated DDoS attacks against web servers., , , , , and . ACM Conference on Computer and Communications Security, page 8-19. ACM, (2003)