Author of the publication

XCHOKE: Malicious Source Control for Congestion Avoidance at Internet Gateways.

, , , , , , and . ICNP, page 186-187. IEEE Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PISA: Automatic Extraction of Traffic Signatures., , and . NETWORKING, volume 3462 of Lecture Notes in Computer Science, page 730-742. Springer, (2005)Controlling malicious sources at Internet gateways., , , and . ICC, page 1636-1640. IEEE, (2003)Home is where the (fast) internet is: flat-rate compatible incentives for reducing peak load., , , and . HomeNets@SIGCOMM, page 13-18. ACM, (2010)The little engine(s) that could: scaling online social networks., , , , , , and . SIGCOMM, page 375-386. ACM, (2010)Distributed Spatial Anomaly Detection., , , and . INFOCOM, page 1705-1713. IEEE, (2008)Lightweight guided random simulation., , and . ISSRE, page 185-191. IEEE Computer Society, (1998)XCHOKE: Malicious Source Control for Congestion Avoidance at Internet Gateways., , , , , , and . ICNP, page 186-187. IEEE Computer Society, (2002)Kangaroo: video seeking in P2P systems., , , , and . IPTPS, page 6. USENIX, (2009)PISA*: A System for Control of DDoS Attacks., , , and . ICC, page 2171-2176. IEEE, (2006)Formal Verification of a Snoop-Based Cache Coherence Protocol Using Symbolic Model Checking., , , , and . VLSI Design, page 288-293. IEEE Computer Society, (1999)