Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regret-Minimizing Representative Databases., , , , and . Proc. VLDB Endow., 3 (1): 1114-1124 (2010)Efficient and scalable query routing for unstructured peer-to-peer networks., , and . INFOCOM, page 1162-1173. IEEE, (2005)Robust traffic matrix estimation with imperfect information: making use of multiple data sources., , , and . SIGMETRICS/Performance, page 133-144. ACM, (2006)A data streaming algorithm for estimating subpopulation flow size distribution., , , and . SIGMETRICS, page 61-72. ACM, (2005)On fundamental tradeoffs between delay bounds and computational complexity in packet scheduling algorithms., and . SIGCOMM, page 279-292. ACM, (2002)TowerDefense: Deployment strategies for battling against IP prefix hijacking., , , , and . ICNP, page 134-143. IEEE Computer Society, (2010)What happened in my network: mining network events from router syslogs., , , , and . Internet Measurement Conference, page 472-484. ACM, (2010)Listen to me if you can: tracking user experience of mobile network on social media., , , , , and . Internet Measurement Conference, page 288-293. ACM, (2010)Design and performance analysis of a DRAM-based statistics counter array architecture., , , and . ANCS, page 84-93. ACM, (2009)Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation., , , and . S&P, page 115-129. IEEE Computer Society, (2004)