Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Access-efficient Balanced Bloom Filters., , and . ICC, page 2723-2728. IEEE, (2012)Palette: Distributing tables in software-defined networks., , and . INFOCOM, page 545-549. IEEE, (2013)Optimizing virtual backup allocation for middleboxes., , , and . ICNP, page 1-10. IEEE Computer Society, (2016)Hash tables with finite buckets are less resistant to deletions., , and . Allerton, page 678-685. IEEE, (2010)Designing Optimal Middlebox Recovery Schemes With Performance Guarantees., , , and . IEEE J. Sel. Areas Commun., 36 (10): 2373-2383 (2018)Maximizing the Throughput of Hash Tables in Network Devices with Combined SRAM/DRAM Memory., , and . IEEE Trans. Parallel Distributed Syst., 26 (3): 796-809 (2015)Optimal Representations of a Traffic Distribution in Switch Memories., , , , and . INFOCOM, page 2035-2043. IEEE, (2019)Efficient Use of Geographically Spread Cloud Resources., , and . CCGRID, page 450-457. IEEE Computer Society, (2013)The Variable-Increment Counting Bloom Filter., , and . IEEE/ACM Trans. Netw., 22 (4): 1092-1105 (2014)Optimizing Virtual Backup Allocation for Middleboxes., , , and . IEEE/ACM Trans. Netw., 25 (5): 2759-2772 (2017)