Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster: On the Application of NLP to Discover Relationships between Malicious Network Entities., , , and . ACM Conference on Computer and Communications Security, page 2641-2643. ACM, (2019)Automatic Kernel Offload Using BPF., , , , , and . HotOS, page 143-149. ACM, (2023)PMSR - Poor Man's Segment Routing, a minimalistic approach to Segment Routing and a Traffic Engineering use case., , , , and . NOMS, page 598-604. IEEE, (2016)D-STREAMON - NFV-Capable Distributed Framework for Network Monitoring., , , , , , and . SOFT5@ITC, page 30-35. IEEE, (2017)978-0-9883045-3-6.Is it a SmartNIC or a Key-Value Store?: Both!, and . SIGCOMM Posters and Demos, page 138-140. ACM, (2017)hXDP: Efficient Software Packet Processing on FPGA NICs., , , , , , , , , and . OSDI, page 973-990. USENIX Association, (2020)Performance evaluation and tuning of Virtual Infrastructure Managers for (Micro) Virtual Network Functions., , , , , , and . NFV-SDN, page 141-147. IEEE, (2016)The case for network functions decomposition., , , , , and . CoNEXT, page 475-476. ACM, (2021)In-network Neural Networks., and . CoRR, (2018)TCP Proxy Bypass: All the Gain with No Pain!, , and . SIGCOMM Posters and Demos, page 88-90. ACM, (2017)