Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simplifying Cloud Management with Cloudless Computing., , , , , , , , and . HotNets, page 95-101. ACM, (2023)Symbolic Distillation for Learned TCP Congestion Control., , , , , and . NeurIPS, (2022)Bolt: Bridging the Gap between Auto-tuners and Hardware-native Performance., , , , , and . MLSys, mlsys.org, (2022)Enabling Resilience in Virtualized RANs with Atlas., , , , , and . MobiCom, page 62:1-62:15. ACM, (2023)Automated Attack Discovery in Data Plane Systems., , and . CSET @ USENIX Security Symposium, USENIX Association, (2019)Architecting Programmable Data Plane Defenses into the Network with FastFlex., , and . HotNets, page 161-169. ACM, (2019)Secure State Migration in the Data Plane., , and . SPIN@SIGCOMM, page 28-34. ACM, (2020)Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries., , and . USENIX Security Symposium, page 3865-3881. USENIX Association, (2021)A Feasibility Study on Time-aware Monitoring with Commodity Switches., , , and . SPIN@SIGCOMM, page 22-27. ACM, (2020)NetWarden: Mitigating Network Covert Channels while Preserving Performance., , and . USENIX Security Symposium, page 2039-2056. USENIX Association, (2020)