Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Timecard: controlling user-perceived delays in server-based mobile applications., , , and . SOSP, page 85-100. ACM, (2013)Fast Control Plane Analysis Using an Abstract Representation., , , and . SIGCOMM, page 300-313. ACM, (2016)Lab of Things: Building a Research Platform for Connected Devices in the Home and Beyond., , and . GetMobile, 18 (4): 37-40 (2014)Using redundancy to enable interactive communication for moving vehicles.. WiOpt, page 1. IEEE, (2009)Controlling the Cost of Reliability in Peer-to-Peer Overlays., , and . IPTPS, volume 2735 of Lecture Notes in Computer Science, page 21-32. Springer, (2003)Don't mind the gap: Bridging network-wide objectives and device-level configurations: brief reflections on abstractions for network programming., , , , and . Comput. Commun. Rev., 49 (5): 104-106 (2019)Programming Distributed Control Planes: Invited Demo: Demo., , , , and . SOSR, page 205-206. ACM, (2017)Test Coverage for Network Configurations., , , , and . NSDI, page 1717-1732. USENIX Association, (2023)Finding protocol manipulation attacks., , , , and . SIGCOMM, page 26-37. ACM, (2011)Lessons from the evolution of the Batfish configuration analysis tool., , , , , and . SIGCOMM, page 122-135. ACM, (2023)