Author of the publication

Optimizing the Update Packet Stream for Web Applications.

, and . BROADNETS, volume 66 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 101-118. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Govindarasu, Manimaran
add a person with the name Govindarasu, Manimaran
 

Other publications of authors with the same name

Energy-Efficient Opportunistic Network Coding Algorithms for Wireless Networks., and . ICCCN, page 1-7. IEEE, (2015)A Case for Mesh-Tree-Interaction in End System Multicasting., and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 186-199. Springer, (2004)An Assured Deletion Technique for Cloud-Based IoT., and . ICCCN, page 1-9. IEEE, (2018)Combined Scheduling of Hard and Soft Real-Time Tasks in Multiprocessor Systems., and . HiPC, volume 2913 of Lecture Notes in Computer Science, page 279-289. Springer, (2003)A scalable approach for DiffServ multicasting., and . ICC, page 2327-2331. IEEE, (2001)Machine Learning-based Cyber-Physical Anomaly Detection in Wide Area Voltage Control Systems., , , and . ISGT, page 1-5. IEEE, (2022)Cyber-vulnerability of power grid monitoring and control systems., , and . CSIIRW, page 43:1-43:3. ACM, (2008)Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses., and . ICDCS, page 93-102. IEEE Computer Society, (2008)Development of the PowerCyber SCADA security testbed., , , , , , and . CSIIRW, page 21. ACM, (2010)Integrated Anomaly Detection for Cyber Security of the Substations., , and . IEEE Trans. Smart Grid, 5 (4): 1643-1653 (2014)