Publications
Mission Accomplished? HTTPS Security after DigiNotar.
Proceedings of the IMC 2017.
(2017).
(2012). Viable Protection of High-Performance Networks through Hardware/Software Co-Design.
Proceedings of ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization.
(2017). Providing Dynamic Control to Passive Network Security Monitoring.
Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
(2015).
(2012). Remote Memory Calls.
HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 38-44.
(2020). Can far memory improve job throughput?.
EuroSys '20: Proceedings of the Fifteenth European Conference on Computer Systems. 1-16.
(2020). Putting logic-based distributed systems on stable grounds.
Theory and Practice of Logic Programming. 16(4), 378-417.
(2016).
(2009).
(2009).
(2002). Image Quality Assessment by Comparing CNN Features Between Images.
Journal of Imaging Science and Technology.
(2016). Symmetry in the Eye of the Beholder .
Proceedings of Vision Sciences Society Annual Meeting.
(2017).
(2008).
(2009).
(2011).
(2012).
(2012).
(2009).
(2013). Let's DISCOH: Collecting an Annotated Open Corpus with Dialogue Acts and Reward Signals for Natural Language Helpdesks.
Proceedings of the IEEE 2006 Workshop on Spoken Language Technology (SLT 2006). 218-221.
(2006). Accountable Internet Protocol (AIP).
339-350.
(2008).
(2007).
(2015).
(1990).