The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ramin Sadre: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ramin Sadre, Boudewijn R. Haverkort
    FiFiQueues: Fixed-Point Analysis of Queueing Networks with Finite-Buffer Stations. [Citation Graph (0, 0)][DBLP]
    Computer Performance Evaluation / TOOLS, 2000, pp:324-327 [Conf]
  2. Boudewijn R. Haverkort, Rachid El Abdouni Khayari, Ramin Sadre
    A Class-Based Least-Recently Used Caching Algorithm for World-Wide Web Proxies. [Citation Graph (0, 0)][DBLP]
    Computer Performance Evaluation / TOOLS, 2003, pp:273-290 [Conf]
  3. Rachid El Abdouni Khayari, Ramin Sadre, Boudewijn R. Haverkort
    A Validation of the Pseudo Self-Similar Traffic Model. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:727-734 [Conf]
  4. Ramin Sadre, Boudewijn R. Haverkort
    Flows in Networks of MAP/MAP/1 Queues. [Citation Graph (0, 0)][DBLP]
    MMB, 2001, pp:195-208 [Conf]
  5. Ramin Sadre, Boudewijn R. Haverkort
    FiFiQueues: Fixed-point Analysis of Queueing Networks with Finite-Buffer Stations. [Citation Graph (0, 0)][DBLP]
    MMB (Kurzvorträge), 1999, pp:77-80 [Conf]
  6. Michael Hanus, Ramin Sadre
    An Abstract Machine for Curry and Its Concurrent Implementation in Java. [Citation Graph (0, 0)][DBLP]
    Journal of Functional and Logic Programming, 1999, v:1999, n:Special Issue 1, pp:- [Journal]
  7. Rachid El Abdouni Khayari, Ramin Sadre, Boudewijn R. Haverkort
    Fitting world-wide web request traces with the EM-algorithm. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2003, v:52, n:2-3, pp:175-191 [Journal]
  8. Rachid El Abdouni Khayari, Ramin Sadre, Boudewijn R. Haverkort, Alexander Ost
    The pseudo-self-similar traffic model: application and validation. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2004, v:56, n:1-4, pp:3-22 [Journal]
  9. Ramin Sadre, Boudewijn R. Haverkort, Patrick Reinelt
    A Fixed-Point Algorithm for Closed Queueing Networks. [Citation Graph (0, 0)][DBLP]
    EPEW, 2007, pp:154-170 [Conf]

  10. Changes in the Web from 2000 to 2007. [Citation Graph (, )][DBLP]


  11. Hidden Markov Model Modeling of SSH Brute-Force Attacks. [Citation Graph (, )][DBLP]


  12. Self-management of hybrid networks: Can we trust netflow data? [Citation Graph (, )][DBLP]


  13. Anomaly Characterization in Flow-Based Traffic Time Series. [Citation Graph (, )][DBLP]


  14. A Labeled Data Set for Flow-Based Intrusion Detection. [Citation Graph (, )][DBLP]


  15. A Statistical Analysis of Network Parameters for the Self-management of Lambda-Connections. [Citation Graph (, )][DBLP]


  16. Detecting Spam at the Network Level. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002