Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tourism Training: An Investigation of Virtual Learning Experience in the Context of a Virtual World., , and . ENTER, page 227-238. Springer, (2012)Power transmission over optical fiber networks., , , , , , and . ICTON, page 1-2. IEEE, (2014)SafeBricks: Shielding Network Functions in the Cloud., , , and . NSDI, page 201-216. USENIX Association, (2018)Combining Neural Network and Wavelet Transformn for Trigger Asynchrony Detection., , and . CIBCB, page 58-64. IEEE, (2007)Embark: Securely Outsourcing Middleboxes to the Cloud., , , , and . NSDI, page 255-273. USENIX Association, (2016)A Unified Architecture for Accelerating Distributed DNN Training in Heterogeneous GPU/CPU Clusters., , , , , and . OSDI, page 463-479. USENIX Association, (2020)Brainformers: Trading Simplicity for Efficiency., , , , , , , , , and 5 other author(s). ICML, volume 202 of Proceedings of Machine Learning Research, page 42531-42542. PMLR, (2023)BlindBox: Deep Packet Inspection over Encrypted Traffic., , , and . SIGCOMM, page 213-226. ACM, (2015)Blocking-resistant communication through domain fronting., , , , and . Proc. Priv. Enhancing Technol., 2015 (2): 46-64 (2015)An Architecture for Network Function Virtualization.. University of California, Berkeley, USA, (2018)