Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks., , , , , and . IACR Cryptol. ePrint Arch., (2021)Measuring the Complexity of Packet Traces., , , and . CoRR, (2019)The Grand CRU Challenge., , , and . HotConNet@SIGCOMM, page 7-11. ACM, (2017)Outsmarting Network Security with SDN Teleportation., , and . EuroS&P, page 563-578. IEEE, (2017)Semantic Interoperability and Interrater Agreement in Annotation of IoT Data., , and . SAWSemStats@ISWC, volume 2549 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Poster: P4DME: DNS Threat Mitigation with P4 In-Network Machine Learning Offload., , and . EuroP4@CoNEXT, page 53-56. ACM, (2023)PowerTCP: Pushing the Performance Limits of Datacenter Networks., , and . NSDI, page 51-70. USENIX Association, (2022)Duo: A High-Throughput Reconfigurable Datacenter Network Using Local Routing and Control., , , , and . SIGMETRICS (Abstracts), page 7-8. ACM, (2023)Pay-as-you-go Population of an Automotive Signal Knowledge Graph., , , and . ESWC, volume 12731 of Lecture Notes in Computer Science, page 717-735. Springer, (2021)Invariants: a new design methodology for network architectures., , , , and . FDNA@SIGCOMM, page 65-70. ACM, (2004)