Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simplifying Cloud Management with Cloudless Computing., , , , , , , , and . HotNets, page 95-101. ACM, (2023)Bolt: Bridging the Gap between Auto-tuners and Hardware-native Performance., , , , , and . MLSys, mlsys.org, (2022)Symbolic Distillation for Learned TCP Congestion Control., , , , , and . NeurIPS, (2022)Enabling Resilience in Virtualized RANs with Atlas., , , , , and . MobiCom, page 62:1-62:15. ACM, (2023)Automated Attack Discovery in Data Plane Systems., , and . CSET @ USENIX Security Symposium, USENIX Association, (2019)Architecting Programmable Data Plane Defenses into the Network with FastFlex., , and . HotNets, page 161-169. ACM, (2019)Secure State Migration in the Data Plane., , and . SPIN@SIGCOMM, page 28-34. ACM, (2020)Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries., , and . USENIX Security Symposium, page 3865-3881. USENIX Association, (2021)A distributed multi-level model with dynamic replacement for the storage of smart edge computing., , and . J. Syst. Archit., (2018)Bedrock: Programmable Network Support for Secure RDMA Systems., , , , , and . USENIX Security Symposium, page 2585-2600. USENIX Association, (2022)