Author of the publication

Inter-Domain Access Volume Model: Ranking Autonomous Systems.

, , , and . ICOIN, volume 5200 of Lecture Notes in Computer Science, page 482-491. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Singing voice detection using twice-iterated composite Fourier transform., , , and . ICME, page 1347-1350. IEEE Computer Society, (2004)Information-Theoretically Secure Three-Party Computation with One Active Adversary, , and . CoRR, (2012)On unconditionally secure multiparty computation for realizing correlated equilibria in games., , and . GlobalSIP, page 241-244. IEEE, (2013)Translating sEMG signals to continuous hand poses using recurrent neural networks., , , and . BHI, page 166-169. IEEE, (2018)Bootstrapped oblivious transfer and secure two-party function computation., and . ISIT, page 1303-1307. IEEE, (2009)SLNR beamforming based iterative power allocation in TD-LTE-A downlink., , , , and . IWCMC, page 84-89. IEEE, (2015)Gaussian-Process-Based Demand Forecasting for Predictive Control of Drinking Water Networks., , , and . CRITIS, volume 8985 of Lecture Notes in Computer Science, page 69-80. Springer, (2014)Application of a content-based percussive sound synthesizer to packet loss recovery in music streaming., , and . ACM Multimedia, page 335-338. ACM, (2003)Zonotopic fault detection observer design for Takagi-Sugeno fuzzy systems., , , and . Int. J. Systems Science, 49 (15): 3216-3230 (2018)Robust optical flow estimation based on brightness correction fields., , , , and . Journal of Zhejiang University - Science C, 12 (12): 1010-1020 (2011)