Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

traIXroute: Detecting IXPs in traceroute paths., and . CoRR, (2016)Comparative assessment of centrality indices and implications on the vulnerability of ISP networks., , , and . International Teletraffic Congress, page 1-9. IEEE, (2014)Collection and analysis of multi-dimensional network data for opportunistic networking research., , , and . Computer Communications, 35 (13): 1613-1625 (2012)The Multiple Instances of Node Centrality and their Implications on the Vulnerability of ISP Networks., , , and . CoRR, (2013)Stumbl: Using Facebook to collect rich datasets for opportunistic networking research., , , and . WOWMOM, page 1-6. IEEE Computer Society, (2011)A Comparative Look into Public IXP Datasets., , , , and . CoRR, (2016)Re-mapping the Internet: Bring the IXPs into Play., , and . CoRR, (2017)O Peer, Where Art Thou?: Uncovering Remote Peering Interconnections at IXPs., , , , , , , , and . IMC, page 265-278. ACM, (2018)Shortcuts through colocation facilities., , , , and . IMC, page 470-476. ACM, (2017)O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs., , , , , , , , and . CoRR, (2019)