Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

End-host controlled multicast routing., , , and . Computer Networks, 50 (6): 807-825 (2006)Load balancing in dynamic structured peer-to-peer systems., , , , and . Perform. Eval., 63 (3): 217-240 (2006)Achieving convergence-free routing using failure-carrying packets., , , , , and . SIGCOMM, page 241-252. ACM, (2007)Brief announcement: towards a secure indirection infrastructure., , , and . PODC, page 383. ACM, (2004)A layered naming architecture for the internet., , , , , and . SIGCOMM, page 343-352. ACM, (2004)How well can congestion pricing neutralize denial of service attacks?, , , and . SIGMETRICS, page 137-150. ACM, (2012)Non-Transitive Connectivity and DHTs., , and . WORLDS, USENIX Association, (2005)Load Balancing in Dynamic Structured P2P Systems., , , , and . INFOCOM, IEEE, (2004)OCALA: An Architecture for Supporting Legacy Applications over Overlays., , , , , and . NSDI, USENIX, (2006)Taming IP packet flooding attacks., , , and . Computer Communication Review, 34 (1): 45-50 (2004)