Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On low-latency-capable topologies, and their impact on the design of intra-domain routing., , , and . SIGCOMM, page 88-102. ACM, (2018)COPA: cooperative power allocation for interfering wireless networks., , , and . CoNEXT, page 18:1-18:13. ACM, (2015)Geographic Routing Made Practical., , , and . NSDI, USENIX, (2005)LOUP: who's afraid of the big bad loop?, , and . HotNets, page 19-24. ACM, (2012)Wedge: Splitting Applications into Reduced-Privilege Compartments., , , and . NSDI, page 309-322. USENIX Association, (2008)Opportunistic Use of Content Addressable Storage for Distributed File Systems., , , , , and . USENIX Annual Technical Conference, General Track, page 127-140. USENIX, (2003)HACK: Hierarchical ACKs for Efficient Wireless Medium Utilization., , , , and . USENIX Annual Technical Conference, page 359-370. USENIX Association, (2014)Polygraph: Automatically Generating Signatures for Polymorphic Worms., , and . IEEE Symposium on Security and Privacy, page 226-241. IEEE Computer Society, (2005)Autograph: Toward Automated, Distributed Worm Signature Detection., and . USENIX Security Symposium, page 271-286. USENIX, (2004)Practical and robust geographic routing in wireless networks., , , and . SenSys, page 295-296. ACM, (2004)