Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Software-Based Fault Isolation., , , and . SOSP, page 203-216. ACM, (1993)Operating System Review 27(5).Understanding and Mitigating Packet Corruption in Data Center Networks., , , , , and . SIGCOMM, page 362-375. ACM, (2017)A Graphical Interactive Debugger for Distributed Systems., , , and . CoRR, (2018)A Quantitative Comparison of Iterative Scheduling Algorithms for Input-Queued Switches., and . Comput. Networks, 30 (24): 2309-2326 (1998)A blueprint for introducing disruptive technology into the Internet., , , and . Comput. Commun. Rev., 33 (1): 59-64 (2003)Reverse traceroute., , , , , , , and . NSDI, page 219-234. USENIX Association, (2010)Oasis: an overlay-aware network stack., , , and . ACM SIGOPS Oper. Syst. Rev., 40 (1): 41-48 (2006)The Performance of Spin Lock Alternatives for Shared-Memory Multiprocessors.. IEEE Trans. Parallel Distributed Syst., 1 (1): 6-16 (1990)Arrakis: The Operating System Is the Control Plane., , , , , , , and . ACM Trans. Comput. Syst., 33 (4): 11:1-11:30 (2016)Evaluating the Power of Flexible Packet Processing for Network Resource Allocation., , , , , and . NSDI, page 67-82. USENIX Association, (2017)