Author of the publication

Monitoring quality-of-experience for operational cellular networks using machine-to-machine traffic.

, , , , , and . INFOCOM, page 1-9. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An effective method for plate number recognition., , and . Multimedia Tools Appl., 77 (2): 1679-1692 (2018)A novel noise reduction method for optical coherence tomography images., , and . CISP-BMEI, page 167-171. IEEE, (2016)Troubleshooting chronic conditions in large IP networks., , , , , , and . CoNEXT, page 2. ACM, (2008)Securely outsourcing power grid simulation on cloud., and . ACM Great Lakes Symposium on VLSI, page 225-226. ACM, (2014)Fast Prefix Matching of Bounded Strings., , , , and . ALENEX, page 128-140. SIAM, (2003)Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services Based on TCP Loss Ratio and Round Trip Time., , , , , and . IEEE/ACM Trans. Netw., 25 (6): 3709-3722 (2017)Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming., , and . IEEE Trans. Computers, 65 (1): 216-229 (2016)Uniform Interpolation Constrained Geodesic Learning on Data Manifold., , , , , and . CoRR, (2020)Locating Prefix Hijackers using LOCK., , , , , and . USENIX Security Symposium, page 135-150. USENIX Association, (2009)A Group Mining Method for Big Data on Distributed Vehicle Trajectories in WAN., , , and . IJDSN, (2015)