Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tracing Cross Border Web Tracking., , , and . Internet Measurement Conference, page 329-342. ACM, (2018)Selfish Overlay Network Creation and Maintenance., , , , , and . IEEE/ACM Trans. Netw., 19 (6): 1624-1637 (2011)Optimizing Gradual SDN Upgrades in ISP Networks., , , and . IEEE/ACM Trans. Netw., 27 (1): 288-301 (2019)Distributed Placement of Service Facilities in Large-Scale Networks., , , , and . INFOCOM, page 2144-2152. IEEE, (2007)Deep Dive into NTP Pool's Popularity and Mapping., , , , , and . Proc. ACM Meas. Anal. Comput. Syst., 8 (1): 15:1-15:30 (2024)The Dagstuhl beginners guide to reproducibility for experimental networking research., , , , , , , , and . Comput. Commun. Rev., 49 (1): 24-30 (2019)One Bad Apple Can Spoil Your IPv6 Privacy., , and . CoRR, (2022)Keep your communities clean: exploring the routing message impact of BGP communities., , and . CoNEXT, page 443-450. ACM, (2020)Seven years in the life of Hypergiants' off-nets., , , , , , , and . SIGCOMM, page 516-533. ACM, (2021)Deep dive into the IoT backend ecosystem., , , , and . IMC, page 488-503. ACM, (2022)