Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Topologies, Power Laws, and Hierarchy, , , , and . (2001)Epidemic Algorithms for Replicated Database Maintenance, , , , , , , , and . (1987)SANE: a protection architecture for enterprise networks, , , , , , and . Proceedings of the 15th conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA, (2006)Architecting for innovation, , , , , , , , , and 3 other author(s). SIGCOMM Comput. Commun. Rev., 41 (3): 24--36 (July 2011)Adaptive Stream Processing using Dynamic Batch Sizing., , , and . SoCC, page 16:1-16:13. ACM, (2014)The Data-Centric Revolution in Networking.. VLDB, page 15. Morgan Kaufmann, (2003)Towards a Modern Communications API., , , and . HotNets, ACM SIGCOMM, (2007)Sharing the Cost of Multicast Transmissions., , and . J. Comput. Syst. Sci., 63 (1): 21-41 (2001)Making greed work in networks a game-theoretic analysis of switch service disciplines.. IEEE/ACM Trans. Netw., 3 (6): 819-831 (1995)Hidden-Action in Network Routing., , , and . IEEE J. Sel. Areas Commun., 25 (6): 1161-1172 (2007)