Christoph Werle

According to our database1, Christoph Werle authored at least 15 papers between 2008 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Skalierbares und robustes Routing auf Internet-ähnlichen Topologien.
PhD thesis, 2014

Greedy Failure-Carrying Packets.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

2013
Everything is better with sprinkles: Greedy routing with bounded stretch.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

2012
Authenticated Quality-of-Service Signaling for Virtual Networks.
J. Commun., 2012

Towards Large-Scale Network Virtualization.
Proceedings of the Wired/Wireless Internet Communication - 10th International Conference, 2012

2011
Can internet users protect themselves? Challenges and techniques of automated protection of HTTP communication.
Comput. Commun., 2011

Building virtual networks across multiple domains.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

On benchmarking routing protocols.
Proceedings of the 17th IEEE International Conference on Networks, 2011

Authenticated Setup of Virtual Links with Quality-of-Service Guarantees.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
Quality of service in the Future Internet.
Proceedings of the 2010 ITU-Kaleidoscope: Beyond the Internet?, 2010

2009
Network Virtualization - An Enabler for Overcoming Ossification.
ERCIM News, 2009

Control Plane Issues in the 4WARD Network Virtualization Architecture.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009

Network virtualization architecture: proposal and initial prototype.
Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures, 2009

Selecting Concurrent Network Architectures at Runtime.
Proceedings of IEEE International Conference on Communications, 2009

2008
Decision process for automated selection of security protocols.
Proceedings of the LCN 2008, 2008


  Loading...