Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems., , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 82-101. Springer, (2012)LD-Sketch: A distributed sketching design for accurate and scalable anomaly detection in network data streams., and . INFOCOM, page 1420-1428. IEEE, (2014)Toward Optimal Network Fault Correction via End-to-End Inference., , and . INFOCOM, page 1343-1351. IEEE, (2007)Triple-fault-tolerant binary MDS array codes with asymptotically optimal repair., , , and . ISIT, page 839-843. IEEE, (2017)Opportunistic use of client repeaters to improve performance of WLANs., , , , , , and . CoNEXT, page 29. ACM, (2008)Achieving Unified Protection for IP Routing., , , , , and . ICCCN, page 1-6. IEEE, (2010)An Algebraic Approach to Computing the Reliability of Internet Routing., , , , and . ICCCN, page 1-6. IEEE, (2011)CloudVS: Enabling version control for virtual machines in an open-source cloud under commodity settings., , and . NOMS, page 188-195. IEEE, (2012)FADE: Secure Overlay Cloud Storage with File Assured Deletion., , , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 380-397. Springer, (2010)A New Construction of EVENODD Codes With Lower Computational Complexity., and . IEEE Communications Letters, 22 (6): 1120-1123 (2018)