Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the quality of broadcast services in vehicular ad hoc networks., , and . Secur. Commun. Networks, 4 (3): 329-346 (2011)Change Point Detection in WLANs with Random AP Forests., , , , and . CoNEXT (Companion), page 29-36. ACM, (2023)On using pretext tasks to learn representations from network logs., , , , , , and . NativeNI@CoNEXT, page 21-26. ACM, (2022)Toward Generative Data Augmentation for Traffic Classification., , , , and . StudentWorkshop@CoNEXT, page 33-34. ACM, (2023)Many or Few Samples?: Comparing Transfer, Contrastive and Meta-Learning in Encrypted Traffic Classification., , , , and . TMA, page 1-10. IEEE, (2023)A First Look at Class Incremental Learning in Deep Learning Mobile Traffic Classification., , , , , , and . TMA, IFIP, (2021)ModelGraft: Accurate, Scalable, and Flexible Performance Evaluation of General Cache Networks, , and . 28th International Teletraffic Congress (ITC 28), Würzburg, Germany, (September 2016)Discrete-time modeling of NFV accelerators that exploit batched processing, , , , , and . ACM Transactions on Modeling and Performance Evaluation of Computing Systems, 6 (3): 1--27 (2021)Tree-based Kendall's τ Maximization for Explainable Unsupervised Anomaly Detection., , , and . ICDM, page 1073-1078. IEEE, (2023)On the Cost of Secure Association of Information Centric Things., , and . ICN, page 207-208. ACM, (2016)