Search

Your search keyword '"Kave Salamatian"' showing total 96 results

Search Constraints

Start Over You searched for: Author "Kave Salamatian" Remove constraint Author: "Kave Salamatian"
96 results on '"Kave Salamatian"'

Search Results

3. Fast Online Packet Classification With Convolutional Neural Network

4. Exploiting the Community Structure of Fraudulent Keywords for Fraud Detection in Web Search

5. Trump contre Huawei : enjeux géopolitiques de la 5G

6. Digital Routes and Borders in the Middle-East: the geopolitical underpinnings of Internet Connectivity

7. Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph

8. Mapping the routes of the Internet for geopolitics: The case of Eastern Ukraine

9. The geopolitics behind the routes data travel: a case study of Iran

10. Misconfiguration Checking for SDN: Data Structure, Theory and Algorithms

12. Measuring the Fragmentation of the Internet: The Case of the Border Gateway Protocol (BGP) During the Ukrainian Crisis

13. Partial Order Theory for Fast TCAM Updates

14. Characterizing and Modeling User Behavior in a Large-Scale Mobile Live Streaming System

15. Index–Trie: Efficient archival and retrieval of network traffic

16. A Massively Multi-Tenant Virtualized Network Intrusion Prevention Service on NFV Platform

17. Adaptive Path Isolation for Elephant and Mice Flows by Exploiting Path Diversity in Datacenters

18. A cartography of web tracking using DNS records

19. Web Tracking Cartography with DNS Records

20. Pull-based Bloom Filter-based Routing for Information-Centric Networks

21. Toward Accurate Inference of Web Activities from Passive DNS Data

22. Video Delivery Performance of a Large-Scale VoD System and the Implications on Content Delivery

23. A Comparative Analysis of Bloom Filter-based Routing Protocols for Information-Centric Networks

24. Enabling automatic composition and verification of service function chain

25. The case for P2P mobile video system over wireless broadband networks: A practical study of challenges for a mobile video provider

26. BFR: a Bloom Filter-based Routing Approach for Information-Centric Networks

27. Les nouveaux territoires stratégiques du cyberespace : le cas de la Russie

28. Transparent flow migration for NFV

29. A Comprehensive Investigation of User Privacy Leakage to Android Applications

30. Adwords management for third-parties in SEM: An optimisation model and the potential of Twitter

31. Protein structural robustness to mutations: an in silico investigation

32. PEARL: a programmable virtual router platform

33. Long range mutual information

34. Securing internet coordinate embedding systems

35. User Behavior Characterization of a Large-scale Mobile Live Streaming System

36. Traffic Analysis of Peer-to-Peer IPTV Communities

37. Meta-algorithms for Software-Based Packet Classification

38. Practical Bloom filter based epidemic forwarding and congestion control in DTNs: A comparative analysis

39. A Hybrid Hardware Architecture for High-speed IP Lookups and Fast Route Updates

40. Towards practical use of Bloom Filter based IP lookup in operational network

41. A fresh look at Forwarding Information Base compression via mathematical analysis

42. On the geographic patterns of a large-scale mobile video-on-demand system

43. Peut-on penser une cybergéographie ?

44. Mobile video popularity distributions and the potential of peer-assisted video delivery

45. Scalable high-performance parallel design for network intrusion detection systems on many-core processors

46. Scalable TCAM-based regular expression matching with compressed finite automata

47. Welcome message from the PADE chairs

48. THash: A Practical Network Optimization Scheme for DHT-based P2P Applications

49. Efficient fingerprint extraction for high performance Intrusion Detection System

50. A Multi-partitioning Approach to Building Fast and Accurate Counting Bloom Filters

Catalog

Books, media, physical & digital resources