Author of the publication

Adaptive manager-side control policy in contract net protocol for massively multi-agent systems.

, , , and . AAMAS (3), page 1433-1436. IFAAMAS, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding abusive web resources: characteristics and counter-measures of malicious web resources and cryptocurrency mining., , and . AINTEC, page 54-61. ACM, (2018)Robust Peer to Peer Mobile Botnet Detection by Using Communication Patterns., , and . AINTEC, page 38-45. ACM, (2018)A comparison of web privacy protection techniques., , and . Comput. Commun., (2019)MARIF: Multiple Queries Look-Up Architecture Using Range Information Feedback in a DHT Network., , , and . IEICE Trans. Commun., 96-B (7): 1680-1690 (2013)Network application profiling with traffic causality graphs., , , , and . Int. J. Netw. Manag., 24 (4): 289-303 (2014)Towards detecting DNSSEC validation failure with passive measurements., , and . NOMS, page 1-6. IEEE, (2020)A cause of self-similarity in TCP traffic., , and . Int. J. Commun. Syst., 18 (6): 603-617 (2005)Highly available network design and resource management of SINET4., , , , , , , and . Telecommun. Syst., 56 (1): 33-47 (2014)Synoptic Graphlet: Bridging the Gap Between Supervised and Unsupervised Profiling of Host-Level Network Traffic., , , , , and . IEEE/ACM Trans. Netw., 21 (4): 1284-1297 (2013)Combining multiresolution and random projections for robust statistical analysis and anomaly detection., , , and . AINTEC, page 1-2. ACM, (2009)