Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SDNFV: Flexible and Dynamic Software Defined Control of an Application- and Flow-Aware Data Plane., , , , , and . Middleware, page 2. ACM, (2016)BBRvl vs BBRv2: Examining Performance Differences through Experimental Evaluation., , , and . LANMAN, page 1-6. IEEE, (2020)Machine Learning at the Edge: Efficient Utilization of Limited CPU/GPU Resources by Multiplexing., , and . ICNP, page 1-6. IEEE, (2020)CleanG - Improving the Architecture and Protocols for Future Cellular Networks With NFV., , and . IEEE/ACM Trans. Netw., 28 (6): 2559-2572 (2020)A Resource Allocation Policy Using Time Thresholding., and . Performance, page 395-413. North-Holland, (1983)Hybrid Packet FEC and Retransmission-based Erasure Recovery Mechanisms for Lossy Networks: Analysis and Design., , and . COMSWARE, IEEE, (2007)Load Balancing of Heterogeneous Workloads in Memcached Clusters., , , , and . Feedback Computing, USENIX Association, (2014)Managing State for Failure Resiliency in Network Function Virtualization., , and . LANMAN, page 1-6. IEEE, (2020)SmartWatch: accurate traffic analysis and flow-state tracking for intrusion prevention using SmartNICs., , , , , and . CoNEXT, page 60-75. ACM, (2021)A ring purger for the FDDI token ring., and . LCN, page 503-514. IEEE Computer Society, (1991)