Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

αRoute: Routing on Names., , , , , and . IEEE/ACM Trans. Netw., 24 (5): 3070-3083 (2016)Mitigating TCP Protocol Misuse With Programmable Data Planes., , , , and . IEEE Trans. Netw. Serv. Manag., 18 (1): 760-774 (2021)Vehicular communication: protocol design, testbed implementation and performance analysis., , , , and . IWCMC, page 410-415. ACM, (2009)UNiS: A User-space Non-intrusive Workflow-aware Virtual Network Function Scheduler., , , , and . CNSM, page 152-160. IEEE Computer Society, (2018)Managing the file system from the kernel., , , , and . NOMS, page 1-8. IEEE, (2014)Re-Architecting NFV Ecosystem with Microservices: State of the Art and Research Challenges., , , and . IEEE Netw., 33 (3): 168-176 (2019)A Disaggregated Packet Processing Architecture for Network Function Virtualization., , , , and . IEEE J. Sel. Areas Commun., 38 (6): 1075-1088 (2020)Defeating Protocol Abuse with P4: Application to Explicit Congestion Notification., , , , and . Networking, page 431-439. IEEE, (2020)Computing a Longest Common Palindromic Subsequence, , , and . CoRR, (2011)Detecting Multi-Step Attacks: A Modular Approach for Programmable Data Plane., , , , and . NOMS, page 1-9. IEEE, (2022)