Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulating large-scale airborne networks with ns-3., , and . WNS3, page 32-39. ACM, (2015)Analysis of Topology Algorithms for Commercial Airborne Networks., , and . ICNP, page 368-373. IEEE Computer Society, (2014)Towards Traffic Benchmarks for Empirical Networking Research: The Role of Connection Structure in Traffic Workload Modeling., , , and . MASCOTS, page 78-86. IEEE Computer Society, (2012)Experiment Replication Using ProtoGENI nodes., , and . GREE, page 9-15. IEEE Computer Society, (2013)Explicit topology management for continental-scale airborne networks., , and . INFOCOM Workshops, page 72-77. IEEE, (2017)Rethinking Security in the Era of Cloud Computing., , , , , , , and . IEEE Secur. Priv., 15 (3): 60-69 (2017)The Influence of Client Platform on Web Page Content: Measurements, Analysis, and Implications., , , and . WISE (2), volume 9419 of Lecture Notes in Computer Science, page 1-16. Springer, (2015)The effects of active queue management on web performance., , , and . SIGCOMM, page 265-276. ACM, (2003)Introduction to network experiments using the GENI cyberinfrastructure., and . SIGMETRICS, page 433-434. ACM, (2012)Education Modules for Networking, Cloud Computing, and Security in Systems Courses., , and . SIGCSE, page 400. ACM, (2016)