Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Stream Processing using Dynamic Batch Sizing., , , and . SoCC, page 16:1-16:13. ACM, (2014)Network Topologies, Power Laws, and Hierarchy, , , , and . (2001)Epidemic Algorithms for Replicated Database Maintenance, , , , , , , , and . (1987)SANE: a protection architecture for enterprise networks, , , , , , and . Proceedings of the 15th conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA, (2006)Architecting for innovation, , , , , , , , , and 3 other author(s). SIGCOMM Comput. Commun. Rev., 41 (3): 24--36 (July 2011)Making greed work in networks a game-theoretic analysis of switch service disciplines.. IEEE/ACM Trans. Netw., 3 (6): 819-831 (1995)On the pitfalls of geographic face routing., , , and . DIALM-POMC, page 34-43. ACM, (2005)Incentive compatibility and dynamics of congestion control., , , and . SIGMETRICS, page 95-106. ACM, (2010)Asymptotic Analysis of Large Heterogeneous Queueing Systems., and . SIGMETRICS, page 56-62. ACM, (1988)Some Conjectures on the Behavior of Acknowledgment-Based Transmission Control of Random Access Communication Channels.. SIGMETRICS, page 245-255. ACM, (1987)