Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compositional proofs of self-stabilizing protocols.. WSS, page 80-94. Carleton University Press, (1997)Self-Stabilization by Counter Flushing.. SIAM J. Comput., 30 (2): 486-510 (2000)Real time network policy checking using header space analysis, , , , , and . Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation, page 99--112. Berkeley, CA, USA, USENIX Association, (2013)Self-Stabilization by Window Washing., and . PODC, page 35-44. ACM, (1996)Crash Failures can Drive Protocols to Arbitrary States., and . PODC, page 247-256. ACM, (1996)Automated measurement of high volume traffic clusters., , and . Internet Measurement Workshop, page 177-178. ACM, (2002)An Improved Construction for Counting Bloom Filters., , , , and . ESA, volume 4168 of Lecture Notes in Computer Science, page 684-695. Springer, (2006)Hash-Based Techniques for High-Speed Packet Processing., , and . Algorithms for Next Generation Networks, Springer, (2010)Bitmap algorithms for counting active flows on high speed links., , and . Internet Measurement Conference, page 153-166. ACM, (2003)On scalable attack detection in the network., , and . Internet Measurement Conference, page 187-200. ACM, (2004)