Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Little Engine(s) That Could: Scaling Online Social Networks., , , , , , and . IEEE/ACM Trans. Netw., 20 (4): 1162-1175 (2012)PISA: Automatic Extraction of Traffic Signatures., , and . NETWORKING, volume 3462 of Lecture Notes in Computer Science, page 730-742. Springer, (2005)Distributed Spatial Anomaly Detection., , , and . INFOCOM, page 1705-1713. IEEE, (2008)The little engine(s) that could: scaling online social networks., , , , , , and . SIGCOMM, page 375-386. ACM, (2010)Lightweight guided random simulation., , and . ISSRE, page 185-191. IEEE Computer Society, (1998)XCHOKE: Malicious Source Control for Congestion Avoidance at Internet Gateways., , , , , , and . ICNP, page 186-187. IEEE Computer Society, (2002)Controlling malicious sources at Internet gateways., , , and . ICC, page 1636-1640. IEEE, (2003)Home is where the (fast) internet is: flat-rate compatible incentives for reducing peak load., , , and . HomeNets@SIGCOMM, page 13-18. ACM, (2010)Kangaroo: video seeking in P2P systems., , , , and . IPTPS, page 6. USENIX, (2009)PISA*: A System for Control of DDoS Attacks., , , and . ICC, page 2171-2176. IEEE, (2006)