Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting locality to ameliorate packet queue contention and serialization., , and . Conf. Computing Frontiers, page 279-290. ACM, (2006)Exploiting Locality to Ameliorate Packet Queue Contention and Serialization., , and . J. Instruction-Level Parallelism, (2008)Optimizing memory bandwidth of a multi-channel packet buffer., , , and . GLOBECOM, page 6. IEEE, (2005)A Fault Modeling Technique to Test Memory BIST Algorithms., , , and . MTDT, page 109-116. IEEE Computer Society, (2002)Algorithms to accelerate multiple regular expressions matching for deep packet inspection., , , , and . SIGCOMM, page 339-350. ACM, (2006)Peacock Hashing: Deterministic and Updatable Hashing for High Performance Networking., , and . INFOCOM, page 101-105. IEEE, (2008)Segmented hash: an efficient hash table implementation for high performance networking subsystems., and . ANCS, page 91-103. ACM, (2005)A few bits are enough - ASIC friendly Regular Expression matching for high speed network security systems., , and . ICNP, page 1-10. IEEE Computer Society, (2013)Advanced algorithms for fast and scalable deep packet inspection., , and . ANCS, page 81-92. ACM, (2006)Divide and discriminate: algorithm for deterministic and fast hash lookups., , , and . ANCS, page 133-142. ACM, (2009)