Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Arrakis: The Operating System is the Control Plane., , , , , , , and . OSDI, page 1-16. USENIX Association, (2014)ETTM: A Scalable Fault Tolerant Network Manager., , , , , and . NSDI, USENIX Association, (2011)The Case for Informed Transport Protocols., , and . Workshop on Hot Topics in Operating Systems, page 58-63. IEEE Computer Society, (1999)Systems Directions for Pervasive Computing., , , , , , , , , and 1 other author(s). HotOS, page 147-151. IEEE Computer Society, (2001)Efficient and Secure Source Authentication with Packet Passports., , , and . SRUTI, USENIX Association, (2006)Satellite: Joint Analysis of CDNs and Network-Level Interference., , , and . USENIX Annual Technical Conference, page 195-208. USENIX Association, (2016)The CRISIS Wide Area Security Architecture., , , and . USENIX Security Symposium, USENIX Association, (1998)Scheduler Activations: Effective Kernel Support for the User-Level Management of Parallelism., , , and . ACM Trans. Comput. Syst., 10 (1): 53-79 (1992)High Performance Packet Processing with FlexNIC., , , , and . ASPLOS, page 67-81. ACM, (2016)One tunnel is (often) enough., , , , , and . SIGCOMM, page 99-110. ACM, (2014)