Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Locality-aware P2P query search with ISP collaboration., and . Networks Heterog. Media, 3 (2): 251-265 (2008)Towards programmable enterprise WLANS with Odin, , , , and . Proceedings of the first workshop on Hot topics in software defined networks, page 115--120. New York, NY, USA, ACM, (2012)Programmatic Orchestration of WiFi Networks, , , , , and . 2014 USENIX Annual Technical Conference (USENIX ATC 14), page 347--358. Philadelphia, PA, USENIX Association, (June 2014)Efficient policies for carrying Web traffic over flow-switched networks., , and . IEEE/ACM Trans. Netw., 6 (6): 673-685 (1998)Deriving traffic demands for operational IP networks: methodology and experience., , , , , and . IEEE/ACM Trans. Netw., 9 (3): 265-280 (2001)Internet clean-slate design: what and why?. Comput. Commun. Rev., 37 (3): 59-64 (2007)Dagstuhl perspectives workshop on end-to-end protocols for the future internet., , , , and . Comput. Commun. Rev., 39 (2): 42-47 (2009)Toward Consistent SDNs: A Case for Network State Fuzzing., , , , , and . IEEE Trans. Netw. Serv. Manag., 17 (2): 668-681 (2020)Blackholing at IXPs: On the Effectiveness of DDoS Mitigation in the Wild., , and . PAM, volume 9631 of Lecture Notes in Computer Science, page 319-332. Springer, (2016)Understanding the Share of IPv6 Traffic in a Dual-Stack ISP., , and . PAM, volume 10176 of Lecture Notes in Computer Science, page 3-16. Springer, (2017)