Author of the publication

An Efficient Overlay Link Performance Monitoring Technique.

, , and . Networking, volume 3976 of Lecture Notes in Computer Science, page 513-524. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A general framework for benchmarking firewall optimization techniques., , , , and . IEEE Trans. Netw. Serv. Manag., 5 (4): 227-238 (2008)Ananta: cloud scale load balancing., , , , , , , , , and 2 other author(s). SIGCOMM, page 207-218. ACM, (2013)Methodology for traffic modeling using two-state Markov-modulated Bernoulli process., , , and . Comput. Commun., 22 (13): 1266-1273 (1999)A Scalable VPN Gateway for Multi-Tenant Cloud Services., , , , , and . Comput. Commun. Rev., 48 (1): 49-55 (2018)Routing-as-a-Service (RaaS): A framework For tenant-directed route control in data center., , , , and . INFOCOM, page 1386-1394. IEEE, (2011)SWIM: A Switch Manager for Datacenter Networks., , , , , and . IEEE Internet Comput., 18 (4): 30-36 (2014)Pingmesh: A Large-Scale System for Data Center Network Latency Measurement and Analysis., , , , , , , , , and 2 other author(s). SIGCOMM, page 139-152. ACM, (2015)Using Social Networks to Analyze the Spatiotemporal Patterns of the Rolling Stock Manufacturing Industry for Countries in the Belt and Road Initiative., , , , and . ISPRS Int. J. Geo Inf., 9 (7): 431 (2020)DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks., , , and . ICC, page 2345-2350. IEEE, (2006)A Proxy View of Quality of Domain Name Service., , , and . INFOCOM, page 321-329. IEEE, (2007)