Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Epidemic Algorithms for Replicated Database Maintenance, , , , , , , , and . (1987)Network Topologies, Power Laws, and Hierarchy, , , , and . (2001)SANE: a protection architecture for enterprise networks, , , , , , and . Proceedings of the 15th conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA, (2006)Architecting for innovation, , , , , , , , , and 3 other author(s). SIGCOMM Comput. Commun. Rev., 41 (3): 24--36 (July 2011)Towards a Modern Communications API., , , and . HotNets, ACM SIGCOMM, (2007)The Data-Centric Revolution in Networking.. VLDB, page 15. Morgan Kaufmann, (2003)Adaptive Stream Processing using Dynamic Batch Sizing., , , and . SoCC, page 16:1-16:13. ACM, (2014)Hidden-Action in Network Routing., , , and . IEEE J. Sel. Areas Commun., 25 (6): 1161-1172 (2007)Sharing the Cost of Multicast Transmissions., , and . J. Comput. Syst. Sci., 63 (1): 21-41 (2001)Making greed work in networks a game-theoretic analysis of switch service disciplines.. IEEE/ACM Trans. Netw., 3 (6): 819-831 (1995)