Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simplifying Manageability, Scalability and Host Mobility in Large-Scale Enterprise Networks using VEIL-click., and . Hot-ICE, USENIX Association, (2011)5GNN: extrapolating 5G measurements through GNNs., , , , , and . GNNet@CoNEXT, page 36-41. ACM, (2022)Pivotality of Nodes in Reachability Problems Using Avoidance and Transit Hitting Time Metrics., , and . WWW (Companion Volume), page 1073-1078. ACM, (2015)How do you 'Tube'., , , and . SIGMETRICS, page 137-138. ACM, (2011)Profiling internet backbone traffic: behavior models and applications., , and . SIGCOMM, page 169-180. ACM, (2005)Fixing BGP, one as at a time., , and . NetT@SIGCOMM, page 295-300. ACM, (2004)Collaborating with the Enemy on Network Management., , , , , , , , and . Security Protocols Workshop, volume 8809 of Lecture Notes in Computer Science, page 154-162. Springer, (2014)STATOEUVER: State-aware Load Balancing for Network Function Virtualization., , and . INFOCOM Workshops, page 1-2. IEEE, (2022)R-BBG2: Recursive Bipartition of Bi-connected Graphs., and . CoRR, (2018)Mutual or Unrequited Love: Identifying Stable Clusters in Social Networks with Uni- and Bi-directional Links., , and . WAW, volume 7323 of Lecture Notes in Computer Science, page 113-125. Springer, (2012)