Author of the publication

How good is your mobile (web) surfing?: speed index inference from encrypted traffic.

, , , , , and . SIGCOMM Posters and Demos, page 35-36. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cumulative Quality Modeling for HTTP Adaptive Streaming., , , , and . CoRR, (2019)Identification of Signaling Patterns in Mobile IoT Signaling Traffic, , and . WueWoWAS 22 - KuVS Fachgespräch - Würzburg Workshop on Next-Generation Communication Networks, (July 2022)Developing a Library of Problem Scenarios for Time-Sensitive and Real-Time Networking, , , , , and . International Conference on Networked Systems 2023 (NetSys), (September 2023)Paving the Way for an Energy Efficient and Sustainable Future Internet of Things, , , and . KuVS Fachgespräch - Würzburg Workshop on Modeling, Analysis and Simulation of Next-Generation Communication Networks 2023, (June 2023)Industrial User Experience Index vs. Quality of Experience Models, , , , and . IEEE Communications Magazine, 61 (1): 98-104 (January 2023)Socially-aware traffic management, , , , , and . Socioinformatics-The Social Impact of Interactions between Humans and IT, page 25--43. Springer International Publishing, (2014)Towards an understanding of visual appeal in website design, , , and . 2013 Fifth International Workshop on Quality of Multimedia Experience (QoMEX), page 70--75. IEEE, (2013)Studying the impact of the content selection method on the video qoe on mobile devices, , , and . 2020 Twelfth International Conference on Quality of Multimedia Experience (QoMEX), page 1--4. IEEE, (2020)Want More WANs? Comparison of Traditional and GAN-Based Generation of Wide Area Network Topologies via Graph and Performance Metrics, , and . IEEE Transactions on Network and Service Management, (2023)Browser Fingerprinting: How to Protect Machine Learning Models and Data with Differential Privacy?, , , , , and . Electronic Communications of the EASST, (2021)