Author of the publication

Parallel Simulation and Virtual-Machine-Based Emulation of Software-Defined Networks.

, and . ACM Trans. Model. Comput. Simul., 26 (1): 8:1-8:27 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-Performance Simulation of Low-Resolution Network Flows., and . Simulation, 82 (1): 21-42 (2006)A Heuristic for Partitioning Parallel Computation., and . Parallel and Distributed Computing and Systems, page 295-297. IASTED/ACTA Press, (1995)A parallel network simulation and virtual time-based network emulation testbed., , and . J. Simulation, 8 (3): 206-214 (2014)Dynamic Remapping of Parallel Computations with Varying Resource Demands., and . IEEE Trans. Computers, 37 (9): 1073-1087 (1988)A Formal-Semantics-Based Calculus of Trust., and . IEEE Internet Comput., 14 (5): 38-46 (2010)Risk Assessment of Cyber Access to Physical Infrastructure in Cyber-Physical Systems.. CPSS@AsiaCCS, page 1-2. ACM, (2016)unFriendly: Multi-party Privacy Risks in Social Networks., , and . Privacy Enhancing Technologies, volume 6205 of Lecture Notes in Computer Science, page 236-252. Springer, (2010)PolicyGlobe: a framework for integrating network and operating system security policies., , and . SafeConfig, page 53-62. ACM, (2009)Parallel Simulation and Virtual-Machine-Based Emulation of Software-Defined Networks., and . ACM Trans. Model. Comput. Simul., 26 (1): 8:1-8:27 (2015)Efficient simulation of Internet worms.. ACM Trans. Model. Comput. Simul., 18 (2): 5:1-5:32 (2008)