Author of the publication

Network recorder and player: FPGA-based network traffic capture and replay.

, , , , , , and . FPT, page 342-345. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Event-based optimization for dispatching policies in material handling systems of general assembly lines., , , , and . CDC, page 2173-2178. IEEE, (2008)LogLog Filter: Filtering Cold Items within a Large Range over High Speed Data Streams., , , , , and . ICDE, page 804-815. IEEE, (2021)A Memory-Efficient Sketch Method for Estimating High Similarities in Streaming Sets., , , , , , and . KDD, page 25-33. ACM, (2019)Efficient topology optimization for a wired networked system by adding wireless communication., , , and . ACC, page 448-453. IEEE, (2012)EV charging load scheduling with high wind power penetration: A robust shortest path approach., , and . ACC, page 2765-2770. IEEE, (2015)Detecting community structure for undirected big graphs based on random walks., , , , and . WWW (Companion Volume), page 1151-1156. ACM, (2014)Simulation-based Sensor Allocation for Dynamic Environment Estimation in Cyber-Physical Building System., , , , and . CASE, page 979-984. IEEE, (2019)A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security., , and . ISNN (2), volume 3174 of Lecture Notes in Computer Science, page 657-662. Springer, (2004)Adversarial Example Detection by Classification for Deep Speech Recognition., , , and . ICASSP, page 3102-3106. IEEE, (2020)Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis., , , and . Trustcom/BigDataSE/ISPA, page 1054-1060. IEEE, (2016)