Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving end-to-end availability using overlay networks.. Massachusetts Institute of Technology, Cambridge, MA, USA, (2004)ndltd.org (oai:dspace.mit.edu:1721.1/30159).SplitScreen: Enabling Efficient, Distributed Malware Detection., , , , , and . NSDI, page 377-390. USENIX Association, (2010)Exact Pattern Matching with Feed-Forward Bloom Filters., and . ALENEX, page 1-12. SIAM, (2011)Measurement and Analysis of TCP Throughput Collapse in Cluster-based Storage Systems., , , , , , and . FAST, page 175-188. USENIX, (2008)Fine-Grained Failover Using Connection Migration., , and . USITS, page 221-232. USENIX, (2001)Resilient Overlay Networks., , , and . SOSP, page 131-145. ACM, (2001)Operating System Review 35(5).Safe and effective fine-grained TCP retransmissions for datacenter communication., , , , , , , and . SIGCOMM, page 303-314. ACM, (2009)Accountable internet protocol (aip)., , , , , and . SIGCOMM, page 339-350. ACM, (2008)Combining Machine Learning and Lifetime-Based Resource Management for Memory Allocation and Beyond., , , , , and . Commun. ACM, 67 (4): 87-96 (April 2024)Topology inference from BGP routing dynamics., , , and . Internet Measurement Workshop, page 243-248. ACM, (2002)