Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reval: A Tool for Real-time Evaluation of DDoS Mitigation Strategies., , , and . USENIX Annual Technical Conference, General Track, page 157-170. USENIX, (2006)The Case for Enterprise-Ready Virtual Private Clouds., , , , and . HotCloud, USENIX Association, (2009)Practical Network-Wide Compression of IP Routing Tables., , , , and . IEEE Trans. Network and Service Management, 9 (4): 446-458 (2012)DECOR: DEClarative network management and OpeRation., , , and . Computer Communication Review, 40 (1): 61-66 (2010)A Practical Architecture for an Anycast CDN., , , , and . TWEB, 5 (4): 17:1-17:29 (2011)Typhoon: An SDN Enhanced Real-Time Big Data Streaming Framework., , , , and . CoNEXT, page 310-322. ACM, (2017)Repeatable mobile networking research with phantomNet: demo., , , , , , , , and . MobiCom, page 489-490. ACM, (2016)The Unpublicized Sea Change in the Internet., and . IEEE Internet Comput., 15 (1): 92-95 (2011)Enhanced Streaming Services in a Content Distribution Network., , , , , , and . IEEE Internet Comput., 5 (4): 66-75 (2001)Service-specific control architectures for ATM., and . IEEE Journal on Selected Areas in Communications, 16 (3): 424-436 (1998)