Author of the publication

Joint Cross-Layer Design for Wireless QoS Content Delivery.

, , and . EURASIP J. Adv. Signal Process., 2005 (2): 167-182 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models., , , , , and . CoRR, (2020)Joint Cross-Layer Design for Wireless QoS Content Delivery., , and . EURASIP J. Adv. Signal Process., 2005 (2): 167-182 (2005)Route and spectrum selection in dynamic spectrum networks., and . CCNC, page 625-629. IEEE, (2006)On Migratory Behavior in Video Consumption., , , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1775-1788 (2021)Packet-Level Telemetry in Large Datacenter Networks., , , , , , , , , and 1 other author(s). SIGCOMM, page 479-491. ACM, (2015)Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers., , , and . USENIX Security Symposium, page 239-254. USENIX Association, (2014)OpenPrompt: An Open-source Framework for Prompt-learning., , , , , , and . ACL (demo), page 105-113. Association for Computational Linguistics, (2022)Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks., , , , , and . CCS, page 67-83. ACM, (2020)On the Embeddability of Random Walk Distances, , , , and . Proc. VLDB Endow., 6 (14): 1690--1701 (September 2013)Adversarial WiFi Sensing., , , , , , and . CoRR, (2018)