Author of the publication

DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection.

, , , and . INFOCOM, IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Server Allocation Algorithms for Tiered Systems., , , , , and . Algorithmica, 48 (2): 129-146 (2007)Assessment of urban-scale wireless networks with a small number of measurements., , and . MobiCom, page 187-198. ACM, (2008)Flexible coloring., , and . Inf. Process. Lett., 111 (11): 538-540 (2011)Deadline scheduling for animation rendering., , , , , , , , , and . SIGMETRICS, page 384-385. ACM, (2005)An Experimental Study of Data Migration Algorithms., , , , , , , and . WAE, volume 2141 of Lecture Notes in Computer Science, page 145-158. Springer, (2001)DDoS-shield: DDoS-resilient scheduling to counter application layer attacks., , , , and . IEEE/ACM Trans. Netw., 17 (1): 26-39 (2009)Fusion: Managing Healthcare Records at Cloud Scale., , , , , , , and . Computer, 45 (11): 42-49 (2012)Auditing to Keep Online Storage Services Honest., , , and . HotOS, USENIX Association, (2007)Remote storage with byzantine servers., and . SPAA, page 280-289. ACM, (2009)Value-maximizing deadline scheduling and its application to animation rendering., , , , , , , , , and . SPAA, page 299-308. ACM, (2005)