Author of the publication

Characterizing Wireless Link Throughput with eBPF and Hardware Timestamps.

, , and . CAMAD, page 302-308. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Partial Signatures in Intrusion Detection for Multipath TCP., , , and . NordSec, volume 11875 of Lecture Notes in Computer Science, page 71-86. Springer, (2019)The Impact of Loss Generation on Emulation-based Protocol Evaluation., , and . Parallel and Distributed Computing and Networks, page 231-237. IASTED/ACTA Press, (2006)An Evaluation of Side-Information Assisted Forensic Hash Matching.. COMPSAC Workshops, page 331-336. IEEE Computer Society, (2014)Classification of indecent videos by low complexity repetitive motion detection., , and . AIPR, page 1-7. IEEE Computer Society, (2008)Using triggers for emulation of opportunistic networking., , , and . MobiOpp, page 155-158. ACM, (2010)Localization Performance for eNodeBs using Solitary and Fused RSS-Modeling Approaches., and . WiMob, page 127-132. IEEE, (2019)A Fragment Hashing Approach for Scalable and Cloud-Aware Network File Detection.. NTMS, page 1-5. IEEE, (2018)Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications., , , and . NTMS, page 1-5. IEEE, (2018)Duplications and Misattributions of File Fragment Hashes in Image and Compressed Files.. NTMS, page 1-5. IEEE, (2018)Efficient traffic offloading for seamless connectivity in 5G networks onboard high speed trains., , , , and . PIMRC, page 1-6. IEEE, (2017)