Author of the publication

Improved Forwarding Architecture and Resource Management for Multi-Core Software Routers.

, , , , , , and . NPC, page 117-124. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A trie merging approach with incremental updates for virtual routers., , , , , and . INFOCOM, page 1222-1230. IEEE, (2013)Performance Modelling of Peer-to-Peer Routing., , , and . IPDPS, page 1-8. IEEE, (2007)Improved Forwarding Architecture and Resource Management for Multi-Core Software Routers., , , , , , and . NPC, page 117-124. IEEE Computer Society, (2009)Evaluating Xen for Router Virtualization., , , , , and . ICCCN, page 1256-1261. IEEE, (2007)Flowstream Architectures., , , , , and . ECEASST, (2009)Scalable Adaptive Hierarchical Clustering., , , and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 1172-1177. Springer, (2002)EHBT: An Efficient Protocol for Group Key Management., , and . Networked Group Communication, volume 2233 of Lecture Notes in Computer Science, page 159-171. Springer, (2001)Certified Internet Coordinates., , , , , and . ICCCN, page 1-8. IEEE Computer Society, (2009)Stealth distributed hash table: unleashing the real potential of peer-to-peer., , , , and . CoNEXT, page 230-231. ACM, (2005)Fast privacy-preserving network function outsourcing., , , , , , , and . Computer Networks, (2019)