Author of the publication

Origin of critical behavior in Ethernet traffic

, , and . Physica A: Statistical Mechanics and its Applications, 287 (1-2): 289--301 (Nov 15, 2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MALAWI: aggregated longitudinal analysis of the MAWI dataset., and . StudentWorkshop@CoNEXT, page 2:1-2:2. ACM, (2011)Strip, bind, and search: a method for identifying abnormal energy consumption in buildings., , , , , , , and . IPSN, page 129-140. ACM, (2013)Counting NATted hosts by observing TCP/IP field behaviors., , and . ICC, page 1265-1270. IEEE, (2012)A fully meshed backbone network for data-intensive sciences and SDN services., , , , , , , , , and 1 other author(s). ICUFN, page 909-911. IEEE, (2016)Dynamics of temporal correlation in daily Internet traffic., , and . GLOBECOM, page 4069-4073. IEEE, (2003)A longitudinal analysis of Internet rate limitations., , , , and . INFOCOM, page 1438-1446. IEEE, (2014)A Quantitative Causal Analysis for Network Log Data., , and . COMPSAC, page 1437-1442. IEEE, (2021)An analysis of privacy leakage in DoQ traffic., and . StudentWorkshop@CoNEXT, page 7-8. ACM, (2021)Towards systematic traffic annotation., , , and . StudentWorkshop@CoNEXT, page 15-16. ACM, (2009)SSOLogin: A framework for automated web privacy measurement with SSO logins., , , and . AINTEC, page 69-77. ACM, (2023)