Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer., , , and . IPTPS, volume 2429 of Lecture Notes in Computer Science, page 121-129. Springer, (2002)Dynamics of Random Early Detection., and . SIGCOMM, page 127-137. ACM, (1997)Labels and event processes in the Asbestos operating system., , , , , , , , and . SOSP, page 17-30. ACM, (2005)Noria: dynamic, partially-stateful data-flow for high-performance web applications., , , , , , , and . OSDI, page 213-231. USENIX Association, (2018)DNS performance and the effectiveness of caching., , , and . Computer Communication Review, 32 (1): 74 (2002)Performance of multihop wireless networks: shortest path is not enough., , , and . Computer Communication Review, 33 (1): 83-88 (2003)Privacy-preserving browser-side scripting with BFlow., , , and . EuroSys, page 233-246. ACM, (2009)DNS performance and the effectiveness of caching., , , and . Internet Measurement Workshop, page 153-167. ACM, (2001)Notary: a device for secure transaction approval., , , , and . SOSP, page 97-113. ACM, (2019)Position: GDPR Compliance by Construction., , , and . Poly/DMAH@VLDB, volume 11721 of Lecture Notes in Computer Science, page 39-53. Springer, (2019)