Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scaling the Performance of Network Intrusion Detection with Many-core Processors., , , , and . ANCS, page 191-192. IEEE Computer Society, (2015)Reducing tail latency using duplication: a multi-layered approach., , , , , , and . CoNEXT, page 246-259. ACM, (2019)Reducing Tail Latency via Safe and Simple Duplication., , , , , , and . CoRR, (2019)A Case for a Stateful Middlebox Networking Stack., , , , and . SIGCOMM, page 355-356. ACM, (2015)Suppressing bot traffic with accurate human attestation., , and . ApSys, page 43-48. ACM, (2010)Kargus: a highly-scalable software-based intrusion detection system., , , , , , , and . CCS, page 317-328. ACM, (2012)mTCP: a Highly Scalable User-level TCP Stack for Multicore Systems., , , , , , and . NSDI, page 489-502. USENIX Association, (2014)AccelTCP: Accelerating Network Applications with Stateful TCP Offloading., , , and . NSDI, page 77-92. USENIX Association, (2020)mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes., , , , and . NSDI, page 113-129. USENIX Association, (2017)APUNet: Revitalizing GPU as Packet Processing Accelerator., , , , and . NSDI, page 83-96. USENIX Association, (2017)