Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks., , , and . IEEE/ACM Trans. Netw., 18 (3): 885-898 (2010)An Architecture for Internet Data Transfer., , , and . NSDI, USENIX, (2006)Raising the Bar for Using GPUs in Software Packet Processing., , , and . NSDI, page 409-423. USENIX Association, (2015)Defragmenting DHT-based Distributed File Systems., , , , and . ICDCS, page 14. IEEE Computer Society, (2007)SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks., , , and . IEEE Symposium on Security and Privacy, page 3-17. IEEE Computer Society, (2008)IdleChat: enabling high bandwidth real-time applications in residential broadband networks., , , , and . Mobile Computing and Communications Review, 15 (3): 10-22 (2011)Achieving One Billion Key-Value Requests per Second on a Single Server., , , , , , , , , and . IEEE Micro, 36 (3): 94-104 (2016)EDF: Ensemble, Distill, and Fuse for Easy Video Labeling., , , and . CoRR, (2018)Using SFS for a Secure Network File System., , and . ;login:, (2002)A Short Primer on Causal Consistency., , , and . ;login:, (2013)