Search the dblp DataBase
Ramin Sadre :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ramin Sadre , Boudewijn R. Haverkort FiFiQueues: Fixed-Point Analysis of Queueing Networks with Finite-Buffer Stations. [Citation Graph (0, 0)][DBLP ] Computer Performance Evaluation / TOOLS, 2000, pp:324-327 [Conf ] Boudewijn R. Haverkort , Rachid El Abdouni Khayari , Ramin Sadre A Class-Based Least-Recently Used Caching Algorithm for World-Wide Web Proxies. [Citation Graph (0, 0)][DBLP ] Computer Performance Evaluation / TOOLS, 2003, pp:273-290 [Conf ] Rachid El Abdouni Khayari , Ramin Sadre , Boudewijn R. Haverkort A Validation of the Pseudo Self-Similar Traffic Model. [Citation Graph (0, 0)][DBLP ] DSN, 2002, pp:727-734 [Conf ] Ramin Sadre , Boudewijn R. Haverkort Flows in Networks of MAP/MAP/1 Queues. [Citation Graph (0, 0)][DBLP ] MMB, 2001, pp:195-208 [Conf ] Ramin Sadre , Boudewijn R. Haverkort FiFiQueues: Fixed-point Analysis of Queueing Networks with Finite-Buffer Stations. [Citation Graph (0, 0)][DBLP ] MMB (Kurzvorträge), 1999, pp:77-80 [Conf ] Michael Hanus , Ramin Sadre An Abstract Machine for Curry and Its Concurrent Implementation in Java. [Citation Graph (0, 0)][DBLP ] Journal of Functional and Logic Programming, 1999, v:1999, n:Special Issue 1, pp:- [Journal ] Rachid El Abdouni Khayari , Ramin Sadre , Boudewijn R. Haverkort Fitting world-wide web request traces with the EM-algorithm. [Citation Graph (0, 0)][DBLP ] Perform. Eval., 2003, v:52, n:2-3, pp:175-191 [Journal ] Rachid El Abdouni Khayari , Ramin Sadre , Boudewijn R. Haverkort , Alexander Ost The pseudo-self-similar traffic model: application and validation. [Citation Graph (0, 0)][DBLP ] Perform. Eval., 2004, v:56, n:1-4, pp:3-22 [Journal ] Ramin Sadre , Boudewijn R. Haverkort , Patrick Reinelt A Fixed-Point Algorithm for Closed Queueing Networks. [Citation Graph (0, 0)][DBLP ] EPEW, 2007, pp:154-170 [Conf ] Changes in the Web from 2000 to 2007. [Citation Graph (, )][DBLP ] Hidden Markov Model Modeling of SSH Brute-Force Attacks. [Citation Graph (, )][DBLP ] Self-management of hybrid networks: Can we trust netflow data? [Citation Graph (, )][DBLP ] Anomaly Characterization in Flow-Based Traffic Time Series. [Citation Graph (, )][DBLP ] A Labeled Data Set for Flow-Based Intrusion Detection. [Citation Graph (, )][DBLP ] A Statistical Analysis of Network Parameters for the Self-management of Lambda-Connections. [Citation Graph (, )][DBLP ] Detecting Spam at the Network Level. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs