Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Evaluation of Multiple-Disk I/O Systems., and . ICPP (1), page 315-318. Pennsylvania State University Press, (1989)Detecting Traffic Anomalies Using Discrete Wavelet Transform., , and . ICOIN, volume 3090 of Lecture Notes in Computer Science, page 951-961. Springer, (2004)Identifying Long-Term High-Bandwidth Flows at a Router., , and . HiPC, volume 2228 of Lecture Notes in Computer Science, page 361-371. Springer, (2001)Data organization in a hybrid storage system., and . ICNC, page 583-587. IEEE Computer Society, (2012)Securing cyber-physical systems with adaptive commensurate response., , , and . CNS, page 1-6. IEEE, (2017)Disjoint Multi-Path Routing and Failure Recovery., and . ICC, page 1-6. IEEE, (2010)MVSS: An Active Storage Architecture., and . IEEE Trans. Parallel Distributed Syst., 14 (10): 993-1005 (2003)An approach to virtual allocation in storage systems., and . ACM Trans. Storage, 2 (4): 371-399 (2006)Performance specification of software components., , , , and . SSR, page 3-10. ACM, (2001)Connect Id: Identifying Devices Before They Connect to the Network., , , and . WF-IoT, page 421-426. IEEE, (2021)