Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Multipath TCP Aware Load Balancer., and . ANRW, page 13-15. ACM, (2016)Increasing the Coverage of a Cooperative Internet Topology Discovery Algorithm., , , and . Networking, volume 4479 of Lecture Notes in Computer Science, page 738-748. Springer, (2007)Evaluation of a Large-Scale Topology Discovery Algorithm., , , and . IPOM, volume 4268 of Lecture Notes in Computer Science, page 193-204. Springer, (2006)Implementation of IOAM for IPv6 in the Linux Kernel., , and . CoRR, (2019)Through the wormhole: tracking invisible MPLS tunnels., , , and . Internet Measurement Conference, page 29-42. ACM, (2017)Café: Automatic Correction and Feedback of Programming Challenges for a CS1 Course., , , and . ACE, page 95-104. ACM, (2020)Virtual Insanity: Linear Subnet Discovery., and . IEEE Trans. Network and Service Management, 17 (2): 1268-1281 (2020)GameCode: Choose your Own Problem Solving Path., and . ICER, page 306. ACM, (2020)On the impact of layer-2 on node degree distribution., , , and . Internet Measurement Conference, page 179-191. ACM, (2010)Retouched bloom filters: allowing networked applications to trade off selected false positives against false negatives., , and . CoNEXT, page 13. ACM, (2006)