Author of the publication

Detection and Handling of TRUNK Congestion in the ATM Network.

, , , , and . APNOMS, volume 5297 of Lecture Notes in Computer Science, page 565-568. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource Systems Reference Database., and . INFOVIS, IEEE Computer Society, (2004)Var-CNN and DynaFlow: Improved Attacks and Defenses for Website Fingerprinting., , , and . CoRR, (2018)Detection and Handling of TRUNK Congestion in the ATM Network., , , , and . APNOMS, volume 5297 of Lecture Notes in Computer Science, page 565-568. Springer, (2008)LaneAF: Robust Multi-Lane Detection With Affinity Fields., , , , , and . IEEE Robotics Autom. Lett., 6 (4): 7477-7484 (2021)NTCIR-5 CLIR Experiments at QUT., , , and . NTCIR, National Institute of Informatics (NII), (2005)4-ordered-Hamiltonian problems of the generalized Petersen graph GP(n, 4)., , , , , , , and . Math. Comput. Model., 57 (3-4): 595-601 (2013)From Models to Microservices: Easily Operationalizing Machine Learning models., , , and . ICCA, page 1-5. IEEE, (2023)Sharing, Licensing, Buying, Selling and Operationalizing ML Models: A Deep Learning based Co-operative and Co-ordinated Security usecase., , , and . ITNAC, page 118-123. IEEE, (2023)DynaFlow: An Efficient Website Fingerprinting Defense Based on Dynamically-Adjusting Flows., , , and . WPES@CCS, page 109-113. ACM, (2018)The Memory Palace: Exploring Visual-Spatial Paths for Strong, Memorable, Infrequent Authentication., , , , and . UIST, page 1109-1121. ACM, (2019)