Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strip, bind, and search: a method for identifying abnormal energy consumption in buildings., , , , , , , and . IPSN, page 129-140. ACM, (2013)A Measurement of Mobile Traffic Offloading., and . PAM, volume 7799 of Lecture Notes in Computer Science, page 73-82. Springer, (2013)A longitudinal analysis of Internet rate limitations., , , , and . INFOCOM, page 1438-1446. IEEE, (2014)Dynamics of temporal correlation in daily Internet traffic., , and . GLOBECOM, page 4069-4073. IEEE, (2003)Counting NATted hosts by observing TCP/IP field behaviors., , and . ICC, page 1265-1270. IEEE, (2012)A fully meshed backbone network for data-intensive sciences and SDN services., , , , , , , , , and 1 other author(s). ICUFN, page 909-911. IEEE, (2016)Traffic Matrix Estimation Using Spike Flow Detection., , , and . IEICE Trans. Commun., 88-B (4): 1484-1492 (2005)amulog: A General Log Analysis Framework for Diverse Template Generation Methods., , , and . CNSM, page 1-5. IEEE, (2020)Estimating Relevance of Items on Basis of Proximity of User Groups on Blogspace., , , , and . Web Intelligence, page 157-164. IEEE Computer Society, (2009)A Quantitative Causal Analysis for Network Log Data., , and . COMPSAC, page 1437-1442. IEEE, (2021)