Author of the publication

PostMan: Rapidly Mitigating Bursty Traffic via On-Demand Offloading of Packet Processing.

, , , , , , , and . IEEE Trans. Parallel Distributed Syst., 33 (2): 374-387 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak., , and . ASIACRYPT (1), volume 10031 of Lecture Notes in Computer Science, page 249-274. (2016)Cryptanalysis of HMAC/NMAC-Whirlpool., , , and . ASIACRYPT (2), volume 8270 of Lecture Notes in Computer Science, page 21-40. Springer, (2013)Cooperative Spectrum Detection Algorithm Based on Likelihood Ratio Law for Cognitive Radio Systems., and . ICIC (2), volume 7390 of Lecture Notes in Computer Science, page 198-204. Springer, (2012)Message prioritization support for space Delay/Disruption Tolerant Networks., , , and . WiSEE, page 87-92. IEEE, (2016)Optimization of Traffic Signal Control with Different Game Theoretical Strategies., and . ICSTCC, page 750-755. IEEE, (2019)A Novel Step Optimal Path Planning Algorithm for the Spherical Mobile Robot Based on Fuzzy Control., , and . IEEE Access, (2020)Correction Method for Measurement of EUT with Dipole Antenna in GTM Cell., , , , and . CSPS, volume 463 of Lecture Notes in Electrical Engineering, page 1685-1692. Springer, (2017)Research on Target Type Recognition Algorithm of Aerial Infrared Image., , and . J. Multim., 8 (5): 468-474 (2013)New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions., , , and . ASIACRYPT (2), volume 11273 of Lecture Notes in Computer Science, page 65-95. Springer, (2018)Control Design for the Autonomous Horizontal Takeoff Phase of the Reusable Launch Vehicles., , , , and . IEEE Access, (2020)