Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relaxing state-access constraints in stateful programmable data planes., , , and . Comput. Commun. Rev., 48 (1): 3-9 (2018)XTRA: Towards Portable Transport Layer Functions., , , , , , and . IEEE Trans. Netw. Serv. Manag., 16 (4): 1507-1521 (2019)Fault tolerant design of signed digit based FIR filters., , , and . ISCAS, IEEE, (2006)On the use of signed digit arithmetic for the new 6-inputs LUT based FPGAs., , , and . ICECS, page 602-605. IEEE, (2008)An Efficient Technique to Protect Serial Shift Registers Against Soft Errors., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 60-II (8): 512-516 (2013)A Fingerprint-based Bloom Filter with Deletion Capabilities., , , and . EuCNC, page 453-458. IEEE, (2019)Traffic-Aware Design of a High-Speed FPGA Network Intrusion Detection System., , and . IEEE Trans. Computers, 62 (11): 2322-2334 (2013)When filtering is not possible caching negatives with fingerprints comes to the rescue., and . CoNEXT, page 435-442. ACM, (2020)Perfect cuckoo filters., and . CoNEXT, page 205-211. ACM, (2021)Implementing a Per-Flow Token Bucket Using Open Packet Processor., , , , and . TIWDC, volume 766 of Communications in Computer and Information Science, page 251-262. Springer, (2017)