Georg Carle

According to our database1, Georg Carle authored at least 219 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Agile Network Access Control in the Container Age.
IEEE Trans. Network and Service Management, 2019

Adaptive Network Management for Safety-Critical Systems.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Data Querying and Access Control for Secure Multiparty Computation.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Multi-party authorization and conflict mediation for decentralized configuration management processes.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Enabling Wireless Network Support for Gain Scheduled Control.
Proceedings of the 2nd International Workshop on Edge Systems, Analytics and Networking, 2019

2018
Throughput and Latency of Virtual Switching with Open vSwitch: A Quantitative Analysis.
J. Network Syst. Manage., 2018

Verified iptables Firewall Analysis and Verification.
J. Autom. Reasoning, 2018

A First Look at Certification Authority Authorization (CAA).
Computer Communication Review, 2018

Performance Implications of Packet Filtering with Linux eBPF.
Proceedings of the 30th International Teletraffic Congress, 2018

The Case for a Network Calculus Heuristic: Using Insights from Data for Tighter Bounds.
Proceedings of the 30th International Teletraffic Congress, 2018

Leveraging interconnections for performance: the serving infrastructure of a large CDN.
Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, 2018

Learning and Generating Distributed Routing Protocols Using Graph-Based Deep Learning.
Proceedings of the 2018 Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, 2018

In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements.
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018

A management framework for secure multiparty computation in dynamic environments.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Trustworthy configuration management for networked devices using distributed ledgers.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Equal-volume quantization of mobile network data using bounding spheres and boxes.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Towards a Deeper Understanding of TCP BBR Congestion Control.
Proceedings of the 17th International IFIP TC6 Networking Conference, 2018

Leveraging Secure Multiparty Computation in the Internet of Things.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

RockFS: Cloud-backed File System Resilience to Client-Side Attacks.
Proceedings of the 19th International Middleware Conference, 2018

Building a Traffic Policer for DDoS Mitigation on Top of Commodity Hardware.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem.
Proceedings of the Internet Measurement Conference 2018, 2018

Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists.
Proceedings of the Internet Measurement Conference 2018, 2018

Evaluation of algorithms for multipath route selection over the Internet.
Proceedings of the 21st Conference on Innovation in Clouds, 2018

An Experimental Performance Analysis of the Cryptographic Database ZeroDB.
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, 2018

Transactional Network Updates in SDN.
Proceedings of the 2018 European Conference on Networks and Communications, 2018

A Performance and Resource Consumption Assessment of Secret Sharing Based Secure Multiparty Computation.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Benchmarking Networked Control Systems.
Proceedings of the Workshop on Benchmarking Cyber-Physical Networks and Systems, 2018

High-performance packet processing and measurements.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

Efficient Dynamic Flow Tracking for Packet Analyzers.
Proceedings of the 7th IEEE International Conference on Cloud Networking, 2018

Intra-Node Resource Isolation for SFC with SR-IOV.
Proceedings of the 7th IEEE International Conference on Cloud Networking, 2018

Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication.
Proceedings of the Applied Networking Research Workshop, 2018

Measuring Adoption of Security Additions to the HTTPS Ecosystem.
Proceedings of the Applied Networking Research Workshop, 2018

User Space Network Drivers.
Proceedings of the Applied Networking Research Workshop, 2018

Behind the scenes: what device benchmarks can tell us.
Proceedings of the Applied Networking Research Workshop, 2018

2017
Push away your privacy: Precise user tracking based on TLS client certificate authentication.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2017

HLOC: Hints-based geolocation leveraging multiple measurement frameworks.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2017

Large-scale classification of IPv6-IPv4 siblings with variable clock skew.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2017

Security Implications of Publicly Reachable Building Automation Systems.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Towards an Ecosystem for Reproducible Research in Computer Networking.
Proceedings of the Reproducibility Workshop, 2017

FlowScope: Efficient packet capture and storage in 100 Gbit/s networks.
Proceedings of the 2017 IFIP Networking Conference, 2017

Information Mining from Public Mailing Lists: A Case Study on IETF Mailing Lists.
Proceedings of the Internet Science - 4th International Conference, 2017

Mission accomplished?: HTTPS security after diginotar.
Proceedings of the 2017 Internet Measurement Conference, 2017

An experimental system for verifying topology changes in mobile communication networks.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Privacy Assessment Using Static Taint Analysis (Tool Paper).
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2017

SDN on ACIDs.
Proceedings of the 2nd Workshop on Cloud-Assisted Networking, 2017

Performance implications for intra-node placement of network function chains.
Proceedings of the 6th IEEE International Conference on Cloud Networking, 2017

Building Fast but Flexible Software Routers.
Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2017

Mind the Gap - A Comparison of Software Packet Generators.
Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2017

Achieving Reproducible Network Environments with INSALATA.
Proceedings of the Security of Networks and Services in an All-Connected World, 2017

2016
Verification of Configuration Management Changes in Self-Organizing Networks.
IEEE Trans. Network and Service Management, 2016

HEAP: Reliable Assessment of BGP Hijacking Attacks.
IEEE Journal on Selected Areas in Communications, 2016

TinyIPFIX: An efficient application protocol for data exchange in cyber physical systems.
Computer Communications, 2016

Network engineering for real-time networks: comparison of automotive and aeronautic industries approaches.
IEEE Communications Magazine, 2016

Scanning the IPv6 Internet: Towards a Comprehensive Hitlist.
Proceedings of the Traffic Monitoring and Analysis - 8th International Workshop, 2016

Digging for Dark IPMI Devices: Advancing BMC Detection and Evaluating Operational Security.
Proceedings of the Traffic Monitoring and Analysis - 8th International Workshop, 2016

Building a Low Latency Linux Software Router.
Proceedings of the 28th International Teletraffic Congress, 2016

sKnock: Port-Knocking for Masses.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems Workshops, 2016

GPLMT: A Lightweight Experimentation and Testbed Management Framework.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

Analyzing Locality of Mobile Messaging Traffic using the MATAdOR Framework.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

A minimum spanning tree-based approach for reducing verification collisions in self-organizing networks.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Distributed smart space orchestration.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Anomaly detection for SOME/IP using complex event processing.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

FLOWer - Device benchmarking beyond 100 Gbit/s.
Proceedings of the 2016 IFIP Networking Conference, 2016

Verified iptables firewall analysis.
Proceedings of the 2016 IFIP Networking Conference, 2016

Rate-Adaptive Link Quality Estimation for Coded Packet Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

An Analysis of IETF Activities Using Mailing Lists and Social Media.
Proceedings of the Internet Science - Third International Conference, 2016

An Optimal Metric-Aware Response Selection Strategy for Intrusion Response Systems.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

A Steiner tree-based verification approach for handling topology changes in self-organizing networks.
Proceedings of the 12th International Conference on Network and Service Management, 2016

Efficient Serving of VPN Endpoints on COTS Server Hardware.
Proceedings of the 5th IEEE International Conference on Cloud Networking, 2016

Collaborative Incident Handling Based on the Blackboard-Pattern.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

Revisiting Benchmarking Methodology for Interconnect Devices.
Proceedings of the 2016 Applied Networking Research Workshop, 2016

2015
Towards Low Latency Software Routers.
JNW, 2015

Towards carrier grade SDNs.
Computer Networks, 2015

Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015

The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015

DoS Amplification Attacks - Protocol-Agnostic Detection of Service Abuse in Amplifier Networks.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015

Optimizing latency and CPU load in packet processing systems.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2015

Adaptive suppression of inter-packet delay variations in coded packet networks.
Proceedings of the 2015 International Symposium on Network Coding, 2015

A study of networking software induced latency.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

MoonGen: A Scriptable High-Speed Packet Generator.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

A graph coloring approach for scheduling undo actions in self-organizing networks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

A Constraint Optimization-Based Resolution of Verification Collisions in Self-Organizing Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Semantics-Preserving Simplification of Real-World Firewall Rule Sets.
Proceedings of the FM 2015: Formal Methods, 2015

Performance benchmarking of a software-based LTE SGW.
Proceedings of the 11th International Conference on Network and Service Management, 2015

Certifying spoofing-protection of firewalls.
Proceedings of the 11th International Conference on Network and Service Management, 2015

Demonstrating topoS: Theorem-prover-based synthesis of secure network configurations.
Proceedings of the 11th International Conference on Network and Service Management, 2015

Comparison of Frameworks for High-Performance Packet IO.
Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for networking and communications systems, 2015

2014
A preamble-based approach for providing quality of service support in wireless sensor networks.
Telecommunication Systems, 2014

Validated Model-Based Performance Prediction of Multi-Core Software Routers.
Praxis der Informationsverarbeitung und Kommunikation, 2014

Directed Security Policies: A Stateful Network Implementation.
Proceedings of the Proceedings Third International Workshop on Engineering Safety and Security Systems, 2014

Flow-inspector: a framework for visualizing network flow data using current web technologies.
Computing, 2014

Network virtualization for disaster resilience of cloud services.
IEEE Communications Magazine, 2014

Detection and resolution of ineffective function behavior in Self-Organizing Networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

PETFEN: A Performance Evaluation Tool for Flow-Level Network Modeling of Ethernet Networks.
Proceedings of the 8th International Conference on Performance Evaluation Methodologies and Tools, 2014

Low latency packet processing in software routers.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2014

Privacy Preserving Energy Management.
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014

Crowdsourced context-modeling as key to future smart spaces.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Analysis of injection capabilities and media access of IEEE 802.11 hardware in monitor mode.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

A deeper understanding of SSH: Results from Internet-wide scans.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

A study of network stack latency for game servers.
Proceedings of the 13th Annual Workshop on Network and Systems Support for Games, 2014

A Post-Action Verification Approach for Automatic Configuration Parameter Changes in Self-Organizing Networks.
Proceedings of the Mobile Networks and Management - 6th International Conference, 2014

Operational Troubleshooting-Enabled Coordination in Self-Organizing Networks.
Proceedings of the Mobile Networks and Management - 6th International Conference, 2014

Towards stochastic flow-level network modeling: Performance evaluation of short TCP flows.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

An experimental system for SON verification.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

A configuration management assessment method for SON verification.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

Malicious BGP hijacks: Appearances can be deceiving.
Proceedings of the IEEE International Conference on Communications, 2014

Verifying Security Policies Using Host Attributes.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2014

MonSamp: an SDN Application for QoS Monitoring.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

Performance characteristics of virtual switching.
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014

2013
The Critical Internet Infrastructure (Dagstuhl Seminar 13322).
Dagstuhl Reports, 2013

A forensic case study on as hijacking: the attacker's perspective.
Computer Communication Review, 2013

DTLS based security and two-way authentication for the Internet of Things.
Ad Hoc Networks, 2013

Practical performance evaluation of ethernet networks with flow-level network modeling.
Proceedings of the 7th International Conference on Performance Evaluation Methodologies and Tools, 2013

RENETO, a realistic network traffic generator for OMNeT++/INET.
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, 2013

The missing layer - Virtualizing smart spaces.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Adaptive load-aware sampling for network monitoring on multicore commodity hardware.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Enabling sustainable smart neighborhoods.
Proceedings of the Sustainable Internet and ICT for Sustainability, 2013

QoS-aware optimal resilient virtual networks.
Proceedings of IEEE International Conference on Communications, 2013

Shared protection in virtual networks.
Proceedings of the IEEE International Conference on Communications, 2013

Taking smart space users into the development loop: an architecture for community based software development for smart spaces.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Optimal design of virtual networks for resilient cloud services.
Proceedings of the 9th International Conference on the Design of Reliable Communication Networks, 2013

Analysis and topology-based traversal of cascaded large scale NATs.
Proceedings of the 2013 workshop on Hot topics in middleboxes and network function virtualization, 2013

CoMaDa: An adaptive framework with graphical support for Configuration, Management, and Data handling tasks for wireless sensor networks.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2012
Iterative multi-party agreement negotiation for establishing collaborations.
Service Oriented Computing and Applications, 2012

Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061).
Dagstuhl Reports, 2012

Charging and Billing in Modern Communications Networks - A Comprehensive Survey of the State of the Art and Future Requirements.
IEEE Communications Surveys and Tutorials, 2012

DIMTOOL: A platform for determining worst case latencies in switched queuing networks.
Proceedings of the 6th International ICST Conference on Performance Evaluation Methodologies and Tools, 2012

Virtual Network Simulator Architecture.
Proceedings of the 14th International Conference on Computer Modelling and Simulation, 2012

Spring-based geolocation.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Analyzing caching benefits for YouTube traffic in edge networks - A measurement-based evaluation.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Resilient Virtual Network Design for End-to-End Cloud Services.
Proceedings of the NETWORKING 2012, 2012

A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Network Calculus and mixed-integer LP applied to a switched aircraft cabin network.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012

Delay Performance of Resilient Cloud Services over Networks.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012

X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle.
Proceedings of the Computer Security - ESORICS 2012, 2012

How to prevent AS hijacking attacks.
Proceedings of the 2012 ACM conference on CoNEXT student workshop, 2012

2011
Data collection in future mobile networks.
Telecommunication Systems, 2011

On Using TPM for Secure Identities in Future Home Networks.
Future Internet, 2011

A simple distributed mechanism for accounting system self-configuration in next-generation charging and billing.
Computer Communications, 2011

Wide-Area Virtual Machine Migration as Resilience Mechanism.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

Securing the internet of things with DTLS.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

Collecting router information for error diagnosis and troubleshooting in home networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Improving Markov-based TCP Traffic Classification.
Proceedings of the 17th GI/ITG Conference on Communication in Distributed Systems, 2011

The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Detecting incidents in wireless mesh networks using flow and routing information.
Proceedings of the Informatik 2011: Informatik schafft Communities, 2011

Investigating the OpenPGP Web of Trust.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
A decentralised service composition approach for peer-to-peer video delivery.
Peer-to-Peer Networking and Applications, 2010

TCP-Verkehrsklassifizierung mit Markov-Modellen.
Praxis der Informationsverarbeitung und Kommunikation, 2010

Lasttransformation durch Rekonstruktion von Auftragslängen anhand von Paketdaten.
Praxis der Informationsverarbeitung und Kommunikation, 2010

Resilience: Widerstandsfähigkeit des Internets gegen Störungen - Stand der Forschung und Entwicklung.
Informatik Spektrum, 2010

TCP Traffic Classification Using Markov Models.
Proceedings of the Traffic Monitoring and Analysis, Second International Workshop, 2010

A secure service infrastructure for interconnecting future home networks based on DPWS and XACML.
Proceedings of the 2010 ACM SIGCOMM workshop on Home networks, 2010

Packet sampling for worm and botnet detection in TCP connections.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

Optimized network configuration parameter assignment based on graph coloring.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

Policy-driven workflows for mobile network management automation.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Collecting sensor data using compressed IPFIX.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

Comparing and improving current packet capturing solutions based on commodity hardware.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

Efficient Protection in Single-Domain Networks Using Network Coding.
Proceedings of the Global Communications Conference, 2010

Gathering Sensor Data in Home Networks with IPFIX.
Proceedings of the Wireless Sensor Networks, 7th European Conference, 2010

2009
Information Model for Packet Sampling Exports.
RFC, March, 2009

Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008.
Computer Science - R&D, 2009

Data Collection for Heterogeneous Handover Decisions in beyond 3G Networks.
Proceedings of the Wireless and Mobile Networking - Second IFIP WG 6.8 Joint Conference, 2009

Pluggable Authorization and Distributed Enforcement with pam_xacml.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2009

Graph coloring based physical-cell-ID assignment for LTE networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

ANTS - A Framework for Knowledge Based NAT Traversal.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

On Using Home Networks and Cloud Computing for a Future Internet of Things.
Proceedings of the Future Internet - FIS 2009, Second Future Internet Symposium, 2009

Preventing identity theft with electronic identity cards and the trusted platform module.
Proceedings of the Second European Workshop on System Security, 2009

2008
Behavior and classification of NAT devices and implications for NAT traversal.
IEEE Network, 2008

Clustering players for load balancing in virtual worlds.
IJAMC, 2008

Adaptive encryption for the realization of real-time transmission of sensitive medical video streams.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

On the Applicability of Knowledge Based NAT-Traversal for Home Networks.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

Towards Autonomic Service Control in Next Generation Networks.
Proceedings of the Fourth International Conference on Autonomic and Autonomous Systems, 2008

Trust-Rated Authentication for Domain-Structured Distributed Systems.
Proceedings of the Public Key Infrastructure, 2008

08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

08102 Working Group -- Measurement Requirements.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

2007
CoSIP - a hybrid architecture for reliable and secure SIP services.
Praxis der Informationsverarbeitung und Kommunikation, 2007

Internet-Telefonie - Voice over IP.
Praxis der Informationsverarbeitung und Kommunikation, 2007

Wired/wireless internet communications.
Computer Communications, 2007

Charging in the IP Multimedia Subsystem: A Tutorial.
IEEE Communications Magazine, 2007

Automated Real Time Performance Management for Mobile Networks.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Automated Trust Negotiation in Autonomic Environments.
Proceedings of the Self-Organizing Systems, Second International Workshop, 2007

CSP, Cooperative Service Provisioning Using Peer-to-Peer Principles.
Proceedings of the Self-Organizing Systems, Second International Workshop, 2007

A cooperative SIP infrastructure for highly reliable telecommunication services.
Proceedings of the Principles, 2007

Real-time Analysis of Flow Data for Network Attack Detection.
Proceedings of the Integrated Network Management, 2007

Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks.
Proceedings of the Global Communications Conference, 2007

2006
Wired/wireless Internet communications.
Computer Communications, 2006

An architecture for autonomic security adaptation.
Annales des Télécommunications, 2006

Foreword - Automatic communication towards new paradigms for network adaptation and control.
Annales des Télécommunications, 2006

Using Netconf for Configuring Monitoring Probes.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

The networking perspective of security performance - A measurement study.
Proceedings of the Proceedings 13th GI/ITG Conference on Measuring, 2006

2005
On the Distribution of Nodes in Distributed Hash Tables.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

04411 Abtracts Collection -- Service Management and Self-Organization in IP-based Networks.
Proceedings of the Service Management and Self-Organization in IP-based Networks, 2005

04411 Preface - Service Management and Self-Organization in IP-based Networks.
Proceedings of the Service Management and Self-Organization in IP-based Networks, 2005

2002
Policy-Based Accounting.
RFC, October, 2002

High Quality IP Video Streaming with Adaptive Packet Marking.
Proceedings of the From QoS Provisioning to QoS Charging, 2002

An MPEG performance model and its application to adaptive forward error correction.
Proceedings of the 10th ACM International Conference on Multimedia 2002, 2002

2001
Intra-flow loss recovery and control for VoIP.
Proceedings of the 9th ACM International Conference on Multimedia 2001, Ottawa, Ontario, Canada, September 30, 2001

Policy-basiertes Metering für IP-Netze.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2001

Deploying an Active Voice Application on a Three-Level Active Network Node Architecture.
Proceedings of the Active Networks, IFIP-TC6 Third International Working Conference, 2001

2000
Adaptive Hybrid Error Control for IP-Based Continuous Media Multicast Services.
Proceedings of the Quality of Future Internet Services, 2000

Panel: Charging for QoS.
Proceedings of the Quality of Future Internet Services, 2000

Active Concealment for Internet Speech Transmission.
Proceedings of the Active Networks, Second International Working Conference, 2000

1999
Charging and Accounting for QoS-Enhanced IP Multicast.
Proceedings of the Protocols for High Speed Networks VI, 1999

Lastabhängige Tarifierung von IP Multicast-Diensten mit Dienstgüteunterstützung.
Proceedings of the Kommunikation in Verteilten Systemen, 1999

A queue management algorithm for intra-flow service differentiation in the "best effort" Internet.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

Policy-Based Billing Architecture for Internet Differentiated Services.
Proceedings of the Broadband Communications: Convergence of Network Technologies, 1999

1998
Dienstqualitätsunterstützung für Audio- und Videodienste im Internet.
Praxis der Informationsverarbeitung und Kommunikation, 1998

How Bad is Reliable Multicast without Local Recovery?
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

RTMC: An Error Control Protocol for IP-based Audio-Visual Multicast Applications.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

Semi-Automated Design of High-Performance Communication Subsystems.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Multipath FEC scheme for the ATM adaptation layer AAL5.
Proceedings of the Broadband Communications: The future of telecommunications, 1998

1997
Zuverlässige Gruppenkommunikationsdienste in ATM-Netzen.
PhD thesis, 1997

Hochleistungsfähige Implementierung von Protokollen mit zellenbasierten Fehlerkontrollmechanismen für ATM-Netze.
Proceedings of the Kommunikation in Verteilten Systemen, 1997

1995
Framework with Scalable Error Control for Reliable Multipoint Services in ATM Networks.
Proceedings of the International Conference on Multimedia Networking, 1995

Enabling High Bandwidth Applications By High-Performance Multicast Transfer Protocol Processing.
Proceedings of the Data Communications and their Performance, 1995

High performance group communication services in ATM networks.
Proceedings of the High-Speed Networking for Multimedia Applications [2nd Int. Workshop on Architecture and Protocols for High Performance Networks, 1995

1994
Adaption Layer and Group Communication Server for Reliable Multipoint Services in ATM Networks.
Proceedings of the Multimedia: Advanced Teleservices and High-Speed Communication Architectures, 1994

Support for High-Performance Multipoint Multimedia Services.
Proceedings of the Multimedia Transport and Teleservices, 1994


  Loading...