Author of the publication

A Time-Series Decomposed Model of Network Traffic.

, , and . ICNC (2), volume 3611 of Lecture Notes in Computer Science, page 338-345. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating network path loss episode frequency by passive measurement., , and . BMEI, page 1457-1461. IEEE, (2012)NetFlow-based network traffic monitoring., , , and . APNOMS, page 1-4. IEEE, (2011)A high-performance and high-programmability reconfigurable wireless development platform., , , , , , , , , and . FPT, page 350-353. IEEE, (2014)An Effective and Efficient Approach for Keyword-Based XML Retrieval., , , and . WAIM, volume 3739 of Lecture Notes in Computer Science, page 56-67. Springer, (2005)A Computational Modelling Approach to the Development of L2 Sound Acquisition., , and . ICPhS, page 755-758. (2011)Detection of Superpoints Using a Vector Bloom Filter., , , and . IEEE Trans. Inf. Forensics Secur., 11 (3): 514-527 (2016)A Current-stress-optimized Control Strategy for DAB Converter Using Hybrid Modulation., , , , , , and . IECON, page 1148-1153. IEEE, (2020)A Time-Series Decomposed Model of Network Traffic., , and . ICNC (2), volume 3611 of Lecture Notes in Computer Science, page 338-345. Springer, (2005)The Invisible Shadow: How Security Cameras Leak Private Activities., , , and . CCS, page 2780-2793. ACM, (2021)RTT Estimation with Sampled Flow Data., , and . IEICE Trans. Commun., 98-B (9): 1848-1857 (2015)