Author of the publication

Leveraging BitTorrent for End Host Measurements.

, , , and . PAM, volume 4427 of Lecture Notes in Computer Science, page 32-41. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Negotiation-Based Routing Between Neighboring ISPs., , and . NSDI, USENIX, (2005)Reverse traceroute., , , , , , , and . NSDI, page 219-234. USENIX Association, (2010)A Quantitative Analysis of Disk Drive Power Management in Portable Computers., , , and . USENIX Winter, page 279-291. USENIX Association, (1994)Network support for IP traceback., , , and . IEEE/ACM Trans. Netw., 9 (3): 226-237 (2001)A Case for NOW (Networks Of Workstations)., , and . IEEE Micro, 15 (1): 54-64 (1995)WebOS: Operating System Services for Wide Area Applications., , , , , , and . HPDC, page 52-63. IEEE Computer Society, (1998)The Performance of Spin Lock Alternatives for Shared-Memory Multiprocessors.. IEEE Trans. Parallel Distrib. Syst., 1 (1): 6-16 (1990)A Quantitative Comparison of Iterative Scheduling Algorithms for Input-Queued Switches., and . Computer Networks, 30 (24): 2309-2326 (1998)Arrakis: The Operating System Is the Control Plane., , , , , , , and . ACM Trans. Comput. Syst., 33 (4): 11:1-11:30 (2016)Oasis: an overlay-aware network stack., , , and . Operating Systems Review, 40 (1): 41-48 (2006)