Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Cooperative Containment of Fast Scanning Worms., , , and . SRUTI, USENIX Association, (2005)Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers., , and . ACSAC, page 361-370. IEEE Computer Society, (2005)DCAP: detecting misbehaving flows via collaborative aggregate policing., , and . Computer Communication Review, 33 (5): 5-18 (2003)NapSAC: design and implementation of a power-proportional web cluster., , , , , and . Computer Communication Review, 41 (1): 102-108 (2011)Optimizing the diamond lane: A more tractable carpool problem and algorithms., , , , , , , and . ITSC, page 1389-1396. IEEE, (2016)ICEBERG: an Internet core network architecture for integrated communications., , , , , , , , , and 4 other author(s). IEEE Personal Commun., 7 (4): 10-19 (2000)Significance of Disk Failure Prediction in Datacenters., and . CoRR, (2017)An Analytic Performance Model of Disk Arrays., and . SIGMETRICS, page 98-109. ACM, (1993)A Comparison of Mechanisms for Improving TCP Performance over Wireless Links., , , and . SIGCOMM, page 256-269. ACM, (1996)PLA optimization using output encoding., and . ICCAD, page 478-481. IEEE Computer Society, (1988)