Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BLT: Bi-Layer Tracing of HTTP and TCP/IP.. Computer Networks, 33 (1-6): 321-335 (2000)Scaling Analysis of Conservative Cascades, with Applications to Network Traffic., , and . IEEE Trans. Information Theory, 45 (3): 971-991 (1999)Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection., and . USENIX Security Symposium, USENIX Association, (2006)Unified Programmability of Virtualized Network Functions and Software-Defined Wireless Networks., , , , , and . IEEE Trans. Network and Service Management, 14 (4): 1046-1060 (2017)The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research., , , , , , , , and . CoRR, (2019)Multi-Source Multi-Path HTTP (mHTTP): A Proposal., , , , and . CoRR, (2013)Watching the IPv6 Takeoff from an IXP's Viewpoint., , and . CoRR, (2014)Site-Specific Models for Realistic Wireless Network Simulation., , and . ACM Trans. Model. Comput. Simul., 25 (1): 3:1-3:24 (2015)Web proxy caching: the devil is in the details., , , , and . SIGMETRICS Performance Evaluation Review, 26 (3): 11-15 (1998)Experiences from the SIGCOMM 2005 European shadow PC experiment.. Computer Communication Review, 35 (3): 97-102 (2005)