Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Secure and Optimized Cross-Slice Communication Establishment., , , , , and . NetSoft, page 127-132. IEEE, (2022)Web graph similarity for anomaly detection (poster)., , and . WWW, page 1167-1168. ACM, (2008)Integrity 2020: Integrity in Social Networks and Media., , , , , , , and . WSDM, page 905-906. ACM, (2020)On Assigning Implicit Reputation Scores in an Online Labor Marketplace., , , and . EDBT, page 724-725. OpenProceedings.org, (2014)Virtual Public Networks., , , , , and . EWSDN, page 1-6. IEEE Computer Society, (2013)Invariant Preserving Middlebox Traversal., and . WWIC, volume 9071 of Lecture Notes in Computer Science, page 139-150. Springer, (2015)Multi-PoP Network Slice Deployment: A Feasibility Study., , , , , , , and . CloudNet, page 1-6. IEEE, (2019)An integrated smooth transmission control and temporal scaling scheme for MPEG-4 streaming video.. ICME, page 33-36. IEEE Computer Society, (2008)Collaborative content caching in wireless edge with SDN., and . CCDWN@CoNEXT, page 6:1-6:7. ACM, (2015)PFA-INT: Lightweight In-Band Network Telemetry with Per-Flow Aggregation., , and . NFV-SDN, page 60-66. IEEE, (2021)