Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tussle in cyberspace: defining tomorrow's internet, , , and . IEEE/ACM Trans. Netw., 13 (3): 462--475 (2005)Evolution of an Active Networks Testbed., , and . DANCE, page 446-465. IEEE Computer Society, (2002)The ASP EE: An Active Network Execution Environment., , , and . DANCE, page 238-254. IEEE Computer Society, (2002)Experience with deter: A testbed for security research., , , , , and . TRIDENTCOM, IEEE, (2006)FARA: reorganizing the addressing architecture, , , and . FDNA '03: Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, page 313--321. New York, NY, USA, ACM Press, (2003)First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems., , , and . CSIIRW, page 39. ACM, (2013)From protocol stack to protocol heap: role-based architecture, , and . SIGCOMM Comput. Commun. Rev., 33 (1): 17--22 (2003)The Internet in Evolution, and TCP Over ATM (Panel)., , , , , , and . SIGMETRICS, page 261-262. ACM, (1995)A pseudo-machine for packet monitoring and statistics.. SIGCOMM, page 200-209. ACM, (1988)Design, Deployment, and Use of the DETER Testbed., , , , , , , and . DETER, USENIX Association, (2007)