Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Increasing network resilience through edge diversity in NEBULA., , , , , , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 16 (3): 14-20 (2012)Better by a HAIR: hardware-amenable Internet routing., , , and . Comput. Networks, 55 (4): 999-1010 (2011)Rehoming edge links for better traffic engineering., , and . Comput. Commun. Rev., 42 (2): 65-71 (2012)Active security., , and . HotNets, page 17:1-17:7. ACM, (2013)JRoute: A Run-Time Routing API for FPGA Hardware.. IPDPS Workshops, volume 1800 of Lecture Notes in Computer Science, page 874-881. Springer, (2000)FluidMem: Memory as a Service for the Datacenter., , , , and . CoRR, (2017)Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial Examples Against Gradient Obfuscation Defenses., , and . AISec@CCS, page 25-36. ACM, (2018)NodeFinder: Scalable Search over Highly Dynamic Geo-distributed State., , , , , and . HotCloud, USENIX Association, (2018)Symbolic encoding of analytic signals for structural monitoring of power systems., , , , and . ACC, page 5157-5162. IEEE, (2011)Life Extending Control of Mechanical Systems* using Symbolic Time Series Analysis., , , and . ACC, page 3765-3770. IEEE, (2006)