Author of the publication

An Optimal Estimation of Origin-Destination Traffic in Large-Scale Backbone Network.

, , , , and . ICC, page 1-5. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Deep Reinforcement Learning based Intrusion Detection Strategy for Smart Vehicular Networks., , , and . INFOCOM Workshops, page 1-6. IEEE, (2022)An Adaptive Measurement Method for Flow Traffic in Software Defined Networking., , , and . SimuTools, volume 295 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 115-124. Springer, (2019)Modeling network traffic for traffic matrix estimation and anomaly detection based on Bayesian network in cloud computing networks., , and . Ann. des Télécommunications, 72 (5-6): 297-305 (2017)A compressive sensing-based network tomography approach to estimating origin-destination flow traffic in large-scale backbone networks., and . Int. J. Commun. Syst., 28 (5): 889-900 (2015)Fine-Grained Resource Management for Edge Computing Satellite Networks., , , , and . GLOBECOM, page 1-6. IEEE, (2019)An Adaptive Algorithm Based on Adaboost for Mimicry Multimode Decisions., , , and . SimuTools (1), volume 369 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 127-136. Springer, (2020)Maximum connectivity-based channel allocation algorithm in cognitive wireless networks for medical applications., , , and . Neurocomputing, (2017)A Three Dimension Super-Resolution Algorithm through Neighbor Embedding Based on Weighted Coefficient Values for Internet of Things., , , , and . IIKI, page 150-155. IEEE Computer Society, (2016)Network Traffic Prediction Based on Deep Belief Network in Wireless Mesh Backbone Networks., , , and . WCNC, page 1-5. IEEE, (2017)A Blockchain-Reinforced Federated Intrusion Detection Architecture for IIoT., , , , , and . IEEE Internet Things J., 11 (16): 26793-26805 (August 2024)