Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting and Isolating Malicious Routers., , , and . IEEE Trans. Dependable Secur. Comput., 3 (3): 230-244 (2006)Jigsaw: solving the puzzle of enterprise 802.11 analysis., , , , , and . SIGCOMM, page 39-50. ACM, (2006)Increasing TCP's Initial Window., , , and . RFC, (April 2013)Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup, , , and . WIAPP '03: Proceedings of the The Third IEEE Workshop on Internet Applications, page 104. Washington, DC, USA, IEEE Computer Society, (2003)The RACK-TLP Loss Detection Algorithm for TCP., , , and . RFC, (February 2021)Proportional rate reduction for TCP., , , and . Internet Measurement Conference, page 155-170. ACM, (2011)Proportional Rate Reduction for TCP., , and . RFC, (May 2013)Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying., , , , and . USENIX Annual Technical Conference, General Track, page 87-98. USENIX, (2004)An Internet-Wide Analysis of Traffic Policing., , , , , , , and . SIGCOMM, page 468-482. ACM, (2016)Research impacting the practice of congestion control., , and . Comput. Commun. Rev., 46 (3): 14:1-14:2 (2016)