Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards distributed emergency flow prioritization in software-defined networks., , , , and . Int. J. Netw. Manag., (2021)Fog Computing: Enabling the Management and Orchestration of Smart City Applications in 5G Networks., , , and . Entropy, 20 (1): 4 (2018)Castles Built on Sand: Observations from Classifying Academic Cybersecurity Datasets with Minimalist Methods., , , , and . IoTBDS, page 61-72. SCITEPRESS, (2023)Live datastore transformation for optimizing big data applications in cloud environments., , , and . IM, page 1-8. IEEE, (2015)Towards the design of a platform for abuse detection in OSNs using multimedial data analysis., , , and . IM, page 1195-1198. IEEE, (2013)In-depth Comparative Evaluation of Supervised Machine Learning Approaches for Detection of Cybersecurity Threats., , , and . IoTBDS, page 125-136. SciTePress, (2019)Towards 6DoF HTTP Adaptive Streaming Through Point Cloud Compression., , , , and . ACM Multimedia, page 2405-2413. ACM, (2019)Co-operative Proxy Caching Algorithms for Time-Shifted IPTV Services., , , , , , and . EUROMICRO-SEAA, page 379-386. IEEE Computer Society, (2006)Distributed Replica Placement Algorithms for Peer-to-Peer Content Distribution Networks., , , , and . EUROMICRO, page 181-188. IEEE Computer Society, (2003)Network-based dynamic prioritization of HTTP adaptive streams to avoid video freezes., , , , and . IM, page 1242-1248. IEEE, (2015)