Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software., , and . OSDI, USENIX Association, (2002)Operating Systems Review 36, Special Issue, Winter 2002.PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services., , , , and . OSDI, page 167-182. USENIX Association, (2004)Lightweight, High-Resolution Monitoring for Troubleshooting Production Systems., , , and . OSDI, page 103-116. USENIX Association, (2008)Scout: a communications-oriented operating system., , , , and . HotOS, page 58-61. IEEE Computer Society, (1995)Proper: Privileged Operations in a Virtualised System Environment., , , , and . USENIX Annual Technical Conference, General Track, page 367-370. USENIX, (2005)Vsys: A Programmable sudo., , , , , and . USENIX Annual Technical Conference, USENIX Association, (2011)A yellow-pages service for a local-area network.. Computer Communication Review, 17 (5): 235-242 (1987)Scalable routing overlay networks., , and . Operating Systems Review, 40 (1): 49-61 (2006)PlanetFlow: maintaining accountability for network services., , and . Operating Systems Review, 40 (1): 89-94 (2006)TCP Extensions Considered Harmful., and . RFC, (October 1991)