Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Analysis of Software Repositories: Identifying Subject Matter Experts., , and . CompleNet, volume 424 of Studies in Computational Intelligence, page 187-198. Springer, (2012)Graph Based Induction of unresponsive routers in Internet topologies., , and . Comput. Networks, (2015)How to Find Hidden Users: A Survey of Attacks on Anonymity Networks., , and . IEEE Commun. Surv. Tutorials, 17 (4): 2296-2316 (2015)ATMOS - A Data Collection and Presentation Toolkit for the Nevada Climate Change Portal., , and . ICSOFT, page 206-213. SciTePress, (2013)An analysis of friend circles of Facebook users., , and . LCN Workshops, page 680-686. IEEE Computer Society, (2015)IoT Traffic Flow Identification using Locality Sensitive Hashes., and . ICC, page 1-6. IEEE, (2020)Network management game., , and . LANMAN, page 1-6. IEEE, (2011)Analysis of academic ties: A case study of Mathematics Genealogy., , and . GLOBECOM Workshops, page 125-129. IEEE, (2011)Mapping Emerging News Networks: A Case Study of the San Francisco Bay Area., , , and . CompleNet, volume 424 of Studies in Computational Intelligence, page 237-244. Springer, (2012)Resolving Anonymous Routers in Internet Topology Measurement Studies., and . INFOCOM, page 1076-1084. IEEE, (2008)