Home

Abhalten Reichlich Gutartig ioannis avramopoulos dblp flexibel Manhattan Grill

PDF) Rationality and Traffic Attraction: Incentives for Honest Path  Announcements in BGP
PDF) Rationality and Traffic Attraction: Incentives for Honest Path Announcements in BGP

PDF) Dynamic Route Computation Considered Harmful
PDF) Dynamic Route Computation Considered Harmful

PDF) Stealth Probing: Efficient Data-Plane Security for IP Routing.
PDF) Stealth Probing: Efficient Data-Plane Security for IP Routing.

PDF) Cabernet: Connectivity architecture for better network services
PDF) Cabernet: Connectivity architecture for better network services

PDF) Putting BGP on the right path: A case for next-hop routing
PDF) Putting BGP on the right path: A case for next-hop routing

PDF) MIRO: Multi-path interdomain ROuting
PDF) MIRO: Multi-path interdomain ROuting

Peter Druschel's research works | Max Planck Institute for Software Systems  Kaiserslautern/Saarbruecken, Kaiserslautern and other places
Peter Druschel's research works | Max Planck Institute for Software Systems Kaiserslautern/Saarbruecken, Kaiserslautern and other places

George Pierrakos's research works | University of California, Berkeley, CA  (UCB) and other places
George Pierrakos's research works | University of California, Berkeley, CA (UCB) and other places

PDF) Pronunciation dictionary development in resource-scarce environments
PDF) Pronunciation dictionary development in resource-scarce environments

PDF) InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic.
PDF) InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic.

PDF) Topology-Awareness and Reoptimization Mechanism for Virtual Network  Embedding
PDF) Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding

PDF) Network Architecture for Joint Failure Recovery and Traffic Engineering
PDF) Network Architecture for Joint Failure Recovery and Traffic Engineering

PDF) Beware of BGP attacks
PDF) Beware of BGP attacks

PDF) Rethinking virtual network embedding: Substrate support for path  splitting and migration
PDF) Rethinking virtual network embedding: Substrate support for path splitting and migration

PDF) Beware of BGP attacks
PDF) Beware of BGP attacks

PDF) From Optimization to Regret Minimization and Back Again.
PDF) From Optimization to Regret Minimization and Back Again.

PDF) Quantifying the BGP Routes Diversity Inside a Tier-1 Network
PDF) Quantifying the BGP Routes Diversity Inside a Tier-1 Network

Bede Liu's research works | Princeton University, New Jersey (PU) and other  places
Bede Liu's research works | Princeton University, New Jersey (PU) and other places

PDF) Architecting for Innovation
PDF) Architecting for Innovation

Yi Wang's research works | Princeton University, New Jersey (PU) and other  places
Yi Wang's research works | Princeton University, New Jersey (PU) and other places

PDF) Asynchronous Alert Correlation in Multi-agent Intrusion Detection  Systems
PDF) Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems

PDF) From Optimization to Regret Minimization and Back Again.
PDF) From Optimization to Regret Minimization and Back Again.

PDF) NetReview: Detecting When Interdomain Routing Goes Wrong.
PDF) NetReview: Detecting When Interdomain Routing Goes Wrong.

PDF) Misbehaving router detection in link-state routing for wireless mesh  networks
PDF) Misbehaving router detection in link-state routing for wireless mesh networks

George Pierrakos's research works | University of California, Berkeley, CA  (UCB) and other places
George Pierrakos's research works | University of California, Berkeley, CA (UCB) and other places