Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning to Protect Communications with Adversarial Neural Cryptography., and . CoRR, (2016)Topology inference from BGP routing dynamics., , , and . Internet Measurement Workshop, page 243-248. ACM, (2002)TensorFuzz: Debugging Neural Networks with Coverage-Guided Fuzzing., , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 4901-4911. PMLR, (2019)Datacenter RPCs can be General and Fast., , and . NSDI, page 1-16. USENIX Association, (2019)Technical perspective: A whitebox solution for blackbox-like behaviors.. Commun. ACM, 62 (11): 136 (2019)The Seattle report on database research., , , , , , , , , and 23 other author(s). Commun. ACM, 65 (8): 72-79 (2022)What the protocol stack missed: the transfer service., , , and . SOSP, page 1-2. ACM, (2005)Challenges and solutions for fast remote persistent memory access., , and . SoCC, page 105-119. ACM, (2020)Measurement and Analysis of TCP Throughput Collapse in Cluster-based Storage Systems., , , , , , and . FAST, page 175-188. USENIX, (2008)Fine-Grained Failover Using Connection Migration., , and . USITS, page 221-232. USENIX, (2001)