Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Network Design for Software-Defined IP/Optical Backbones., , and . CoRR, (2019)Collaborative, Privacy-Preserving Data Aggregation at Scale., , , , and . IACR Cryptol. ePrint Arch., (2009)Automating the Testing of OpenFlow Applications, , , , and . 1st International Workshop on Rigorous Protocol Engineering (WRiPE'11), (October 2011)The Case for Separating Routing from Routers, , , , and . ACM SIGCOMM Workshop on Future Directions in Network Architecture (FDNA), Portland, OR, (September 2004)Infinite CacheFlow in Software-Defined Networks, , and . Princeton School of Engineering and Applied Science, (October 2013)Compositional Network Mobility., and . VSTTE, volume 8164 of Lecture Notes in Computer Science, page 68-87. Springer, (2013)VROOM: Virtual ROuters On the Move., , and . HotNets, ACM SIGCOMM, (2007)Passive OS Fingerprinting on Commodity Switches., , and . NetSoft, page 264-268. IEEE, (2022)How Effective is Multiple-Vantage-Point Domain Control Validation?, , , , and . USENIX Security Symposium, page 5701-5718. USENIX Association, (2023)Improving End-to-End Performance of the Web Using Server Volumes and Proxy Filters., , and . SIGCOMM, page 241-253. ACM, (1998)