Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using redundancy to enable interactive communication for moving vehicles.. WiOpt, page 1. IEEE, (2009)Timecard: controlling user-perceived delays in server-based mobile applications., , , and . SOSP, page 85-100. ACM, (2013)Lab of Things: Building a Research Platform for Connected Devices in the Home and Beyond., , and . GetMobile, 18 (4): 37-40 (2014)Fast Control Plane Analysis Using an Abstract Representation., , , and . SIGCOMM, page 300-313. ACM, (2016)Controlling the Cost of Reliability in Peer-to-Peer Overlays., , and . IPTPS, volume 2735 of Lecture Notes in Computer Science, page 21-32. Springer, (2003)Finding protocol manipulation attacks., , , , and . SIGCOMM, page 26-37. ACM, (2011)Lessons from the evolution of the Batfish configuration analysis tool., , , , , and . SIGCOMM, page 122-135. ACM, (2023)Packet-Level Telemetry in Large Datacenter Networks., , , , , , , , , and 1 other author(s). SIGCOMM, page 479-491. ACM, (2015)RAIL: A Case for Redundant Arrays of Inexpensive Links in Data Center Networks., , , , , , , and . NSDI, page 561-576. USENIX Association, (2017)Gestalt: Fast, Unified Fault Localization for Networked Systems., , , and . USENIX Annual Technical Conference, page 255-267. USENIX Association, (2014)