From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PISA: Automatic Extraction of Traffic Signatures., , и . NETWORKING, том 3462 из Lecture Notes in Computer Science, стр. 730-742. Springer, (2005)Kangaroo: video seeking in P2P systems., , , , и . IPTPS, стр. 6. USENIX, (2009)Distributed Spatial Anomaly Detection., , , и . INFOCOM, стр. 1705-1713. IEEE, (2008)The little engine(s) that could: scaling online social networks., , , , , , и . SIGCOMM, стр. 375-386. ACM, (2010)XCHOKE: Malicious Source Control for Congestion Avoidance at Internet Gateways., , , , , , и . ICNP, стр. 186-187. IEEE Computer Society, (2002)Lightweight guided random simulation., , и . ISSRE, стр. 185-191. IEEE Computer Society, (1998)Controlling malicious sources at Internet gateways., , , и . ICC, стр. 1636-1640. IEEE, (2003)Home is where the (fast) internet is: flat-rate compatible incentives for reducing peak load., , , и . HomeNets@SIGCOMM, стр. 13-18. ACM, (2010)PISA*: A System for Control of DDoS Attacks., , , и . ICC, стр. 2171-2176. IEEE, (2006)Formal Verification of a Snoop-Based Cache Coherence Protocol Using Symbolic Model Checking., , , , и . VLSI Design, стр. 288-293. IEEE Computer Society, (1999)