From post

Towards Understanding the Interplay of Generative Artificial Intelligence and the Internet.

, , , , , и . Epi UAI, том 14523 из Lecture Notes in Computer Science, стр. 59-73. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach., , , и . ACM Conference on Computer and Communications Security, стр. 1778-1780. ACM, (2016)Troubleshooting PON networks effectively with carrier-grade ethernet and WDM-PON., , и . IEEE Commun. Mag., 52 (2): 7-13 (2014)Study of a hybrid OCDMA-WDM segmented ring for metropolitan area networks., , , , и . HPSR, стр. 83-88. IEEE, (2011)Energy-aware flow allocation algorithm for Energy Efficient Ethernet networks., , , и . SoftCOM, стр. 1-5. IEEE, (2011)An empirical study of Cloud Gaming., , , и . NetGames, стр. 1-2. IEEE, (2012)Analysis and Evaluation of Antivirus Engines in Detecting Android Malware: A Data Analytics Approach., , , и . EISIC, стр. 7-14. IEEE, (2018)SignatureMiner: A Fast Anti-Virus Signature Intelligence Tool., , и . CNS, стр. 1-2. IEEE, (2018)A Comparative Study on Shared Precomputed Restoration and Shared Backup Path Protection in EONs., , , , и . ISCC, стр. 1-6. IEEE, (2022)Applications of Machine Learning Techniques for What-if Analysis and Network Overload Detection., , , и . DRCN, стр. 1-7. IEEE, (2022)Count-Min sketches for Telemetry: analysis of performance in P4 implementations., , , , , , и . CoRR, (2024)