Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding and improving TCP performance over networks with minimum rate guarantees., , , and . IEEE/ACM Trans. Netw., 7 (2): 173-187 (1999)Performance analysis of multi-dimensional packet classification on programmable network processors., and . Computer Communications, 28 (15): 1752-1760 (2005)Forensix: A Robust, High-Performance Reconstruction System., , , , and . ICDCS Workshops, page 155-162. IEEE Computer Society, (2005)Teaching with angr: A Symbolic Execution Curriculum and CTF., and . ASE @ USENIX Security Symposium, USENIX Association, (2018)Mitigating information exposure to cheaters in real-time strategy games., , , and . NOSSDAV, page 7-12. ACM, (2005)A traffic characterization of popular on-line games., , , and . IEEE/ACM Trans. Netw., 13 (3): 488-500 (2005)The Impact of Active Queue Management on Multimedia Congestion Control., and . ICCCN, page 214-218. IEEE Computer Society, (1998)MetaCAPTCHA: A Metamorphic Throttling Service for the Web., , , , and . ICNP, page 665-670. IEEE Computer Society, (2014)SpotCheck: An efficient defense against information exposure cheats., , and . NETGAMES, page 1-6. IEEE, (2011)kaPoW plugins: protecting web applications using reputation-based proof-of-work., , and . WebQuality@WWW, page 60-63. ACM, (2012)