Author of the publication

IPTV-RM: A Resources Monitoring Architecture for P2P IPTV Systems.

, , and . J. Networks, 7 (10): 1624-1630 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network structural perturbation against interlayer link prediction., , , , and . Knowl. Based Syst., (2022)PurExt: Automated Extraction of the Purpose-Aware Rule from the Natural Language Privacy Policy in IoT., , , , and . Secur. Commun. Networks, (2021)A Video Sharing Site Oriented Data Collection System., , and . J. Softw., 8 (12): 3007-3015 (2013)An Improved Adaptive Routing Algorithm Based on Link Analysis., , and . J. Networks, 7 (1): 135-140 (2012)An efficient scheme for SDN state consistency verification in cloud computing environment., , , and . Concurr. Comput. Pract. Exp., (2020)Laws and Regulations tell how to classify your data: A case study on higher education., , , , , and . Inf. Process. Manag., 60 (3): 103240 (May 2023)End-to-end attack on text-based CAPTCHAs based on cycle-consistent generative adversarial network., , , , , and . Neurocomputing, (2021)ClueGraphSum: Let Key Clues Guide the Cross-Lingual Abstractive Summarization., , , , , and . CoRR, (2022)ApkClassiFy: Identification and Classification of packed Android Malicious Applications., , , , , and . GLOBECOM, page 2092-2097. IEEE, (2022)Fake Restaurant Review Detection Using Deep Neural Networks with Hybrid Feature Fusion Method., , and . DASFAA (3), volume 13247 of Lecture Notes in Computer Science, page 133-148. Springer, (2022)