Author of the publication

Towards minimalistic, virtualized content caches with minicache.

, , , and . HotMiddlebox@CoNEXT, page 13-18. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building a decentralized, cooperative, and privacy-preserving monitoring system for trustworthiness: the approach of the EU FP7 DEMONS project Very Large Projects., , , , and . IEEE Communications Magazine, 49 (11): 16-18 (2011)An edge-to-edge filtering architecture against DoS., and . Computer Communication Review, 37 (2): 39-50 (2007)Flow processing and the rise of commodity network hardware., , , , , and . Computer Communication Review, 39 (2): 20-26 (2009)BrainSlug: Transparent Acceleration of Deep Learning Through Depth-First Parallelism., , , and . CoRR, (2018)Enhancing the BRAS through virtualization., , , , , and . NetSoft, page 1-5. IEEE, (2015)Deployable filtering architectures against large denial-of-service attacks.. University College London, UK, (2010)British Library, EThOS.Lost in Network Address Translation: Lessons from Scaling the World's Simplest Middlebox., , and . HotMiddlebox@SIGCOMM, page 19-24. ACM, (2015)Using Routing and Tunneling to Combat DoS Attacks., , and . SRUTI, USENIX Association, (2005)Crosstalk: A Scalable Cross-Protocol Monitoring System for Anomaly Detection., , , , and . ICC, page 1-6. IEEE, (2010)What's app?: a wide-scale measurement study of smart phone markets., , , , , and . Mobile Computing and Communications Review, 16 (2): 16-27 (2012)