Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Construction of EVENODD Codes With Lower Computational Complexity., and . IEEE Communications Letters, 22 (6): 1120-1123 (2018)ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems., , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 82-101. Springer, (2012)Robust Data Preprocessing for Machine-Learning-Based Disk Failure Prediction in Cloud Production Environments., , , , , , , , , and . CoRR, (2019)Enabling Efficient Updates in KV Storage via Hashing: Design and Performance Evaluation., , , and . ACM Trans. Storage, 15 (3): 20:1-20:29 (2019)Achieving Unified Protection for IP Routing., , , , , and . ICCCN, page 1-6. IEEE, (2010)An Algebraic Approach to Computing the Reliability of Internet Routing., , , , and . ICCCN, page 1-6. IEEE, (2011)Triple-fault-tolerant binary MDS array codes with asymptotically optimal repair., , , and . ISIT, page 839-843. IEEE, (2017)Opportunistic use of client repeaters to improve performance of WLANs., , , , , , and . CoNEXT, page 29. ACM, (2008)LD-Sketch: A distributed sketching design for accurate and scalable anomaly detection in network data streams., and . INFOCOM, page 1420-1428. IEEE, (2014)Toward Optimal Network Fault Correction via End-to-End Inference., , and . INFOCOM, page 1343-1351. IEEE, (2007)