Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Configuration of 802.11e EDCA Under Voice Traffic., , and . GLOBECOM, page 5107-5111. IEEE, (2007)kaNSaaS: Combining Deep Learning and Optimization for Practical Overbooking of Network Slices., , , and . MobiHoc, page 51-60. ACM, (2023)A Model to Quantify the Success of a Sybil Attack Targeting RELOAD/Chord Resources., , , and . IEEE Commun. Lett., 17 (2): 428-431 (2013)Alviu: An Intent-Based SD-WAN Orchestrator of Network Slices for Enterprise Networks., , and . NetSoft, page 211-215. IEEE, (2021)Forecasting for Network Management with Joint Statistical Modelling and Machine Learning., , , , and . WoWMoM, page 60-69. IEEE, (2022)Revisiting 802.11 Rate Adaptation from Energy Consumption's Perspective., , , , , and . MSWiM, page 27-34. ACM, (2016)Detection of malicious parameter configurations in 802.11e EDCA., , and . GLOBECOM, page 5. IEEE, (2005)Routing Fairness in Chord: Analysis and Enhancement., , and . INFOCOM, page 1449-1457. IEEE, (2009)Rate allocation for layered multicast streaming with inter-layer network coding., , , and . INFOCOM, page 2796-2800. IEEE, (2012)Demo: vrAIn Proof-of-Concept - A Deep Learning Approach for Virtualized RAN Resource Control., , , , , and . MobiCom, page 59:1-59:3. ACM, (2019)