default search action
Tilman Wolf
Person information
- affiliation: University of Massachusetts, Amherst MA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c120]Puming Fang, Tilman Wolf:
Value Trees: Multi-Hop and Asynchronous Economic Transactions in Distributed Systems. ICCCN 2023: 1-10 - [c119]Puming Fang, Tilman Wolf:
Implementing Virtual Network Functions in Named Data Networking and Web 3.0. ICNC 2023: 117-123 - 2022
- [j41]Zhaodong Kang, Jin Xu, Wenqi Wang, Jie Jiang, Shiqi Jiang, Tong Yang, Bin Cui, Tilman Wolf:
Coloring Embedder: Towards Multi-Set Membership Queries in Web Cache Sharing. IEEE Trans. Knowl. Data Eng. 34(12): 5664-5680 (2022) - 2021
- [c118]Puming Fang, Tilman Wolf:
Enabling Virtual Network Functions in Named Data Networking. INFOCOM Workshops 2021: 1-6 - 2020
- [c117]Hao Cai, Tilman Wolf:
Implementation of Network Source Authentication and Path Validation Using Orthogonal Sequences. ICCCN 2020: 1-7 - [c116]Abhishek Dwaraki, Shachi Kumary, Tilman Wolf:
Automated Event Identification from System Logs Using Natural Language Processing. ICNC 2020: 209-215 - [c115]Bohan Zhao, Rui Li, Jin Zhao, Tilman Wolf:
Efficient and Consistent TCAM Updates. INFOCOM 2020: 1241-1250
2010 – 2019
- 2019
- [j40]Bohan Zhao, Jin Zhao, Xin Wang, Tilman Wolf:
RuleTailor: Optimizing Flow Table Updates in OpenFlow Switches With Rule Transformations. IEEE Trans. Netw. Serv. Manag. 16(4): 1581-1594 (2019) - [c114]Tilman Wolf, Anna Nagurney, James Griffioen, Kenneth L. Calvert:
Enhancing Interdomain Transport via Economic Software-Defined Exchange Points. ICNC 2019: 473-479 - [c113]Arman Pouraghily, Tilman Wolf:
A Lightweight Payment Verification Protocol for Blockchain Transactions on IoT Devices. ICNC 2019: 617-623 - [c112]Abhishek Dwaraki, Richard G. Freedman, Shlomo Zilberstein, Tilman Wolf:
Using Natural Language Constructs and Concepts to Aid Network Management. ICNC 2019: 802-808 - [c111]Kenneth L. Calvert, James Griffioen, Anna Nagurney, Tilman Wolf:
A Vision for a Spot Market for Interdomain Connectivity. ICDCS 2019: 1860-1867 - [c110]Arman Pouraghily, Tilman Wolf:
Securing IoT Protocol Implementations Through Hardware Monitoring. MASS 2019: 467-475 - 2018
- [j39]Ilya Baldin, Tilman Wolf:
The Future of CISE Distributed Research Infrastructure. Comput. Commun. Rev. 48(2): 46-51 (2018) - [j38]Jiawei Li, Hongbin Luo, Shan Zhang, Shui Yu, Tilman Wolf:
Traffic Engineering in Information-Centric Networking: Opportunities, Solutions and Challenges. IEEE Commun. Mag. 56(11): 124-130 (2018) - [c109]Kun Qiu, Yuanyang Zhu, Jing Yuan, Jin Zhao, Xin Wang, Tilman Wolf:
ParaPLL: Fast Parallel Shortest-path Distance Query on Large-scale Weighted Graphs. ICPP 2018: 2:1-2:10 - [c108]Hao Cai, Tilman Wolf:
Self-Adapting Quorum-Based Neighbor Discovery in Wireless Sensor Networks. INFOCOM 2018: 324-332 - [c107]Arman Pouraghily, Md. Nazmul Islam, Sandip Kundu, Tilman Wolf:
Poster Abstract: Privacy in Blockchain-Enabled IoT Devices. IoTDI 2018: 292-293 - [c106]George Provelengios, Arman Pouraghily, Russell Tessier, Tilman Wolf:
A Hardware Monitor to Protect Linux System Calls. ISVLSI 2018: 551-556 - [i1]Jay Aikat, Ilya Baldin, Mark Berman, Joe Breen, Richard R. Brooks, Prasad Calyam, Jeffrey S. Chase, Wallace Chase, Russ Clark, Chip Elliott, Jim Griffioen, Dijiang Huang, Julio Ibarra, Tom Lehman, Inder Monga, Abraham Matta, Christos Papadopoulos, Mike Reiter, Dipankar Raychaudhuri, Glenn Ricart, Robert Ricci, Paul Ruth, Ivan Seskar, Jerry Sobieski, Kobus van der Merwe, Kuang-Ching Wang, Tilman Wolf, Michael Zink:
The Future of CISE Distributed Research Infrastructure. CoRR abs/1803.09886 (2018) - 2017
- [c105]Arman Pouraghily, Tilman Wolf, Russell Tessier:
Hardware support for embedded operating system security. ASAP 2017: 61-66 - [c104]Thiago Teixeira, Andres Marentes, Tilman Wolf:
Economic incentives in virtualized access networks. ICC 2017: 1-7 - 2016
- [j37]Andres Marentes, Tilman Wolf, Anna Nagurney, Yezid Donoso:
Towards Pricing Mechanisms for Delay Tolerant Services. Int. J. Comput. Commun. Control 11(1): 77-89 (2016) - [j36]Kekai Hu, Harikrishnan Kumarapillai Chandrikakutty, Zachary Goodman, Russell Tessier, Tilman Wolf:
Dynamic Hardware Monitors for Network Processor Protection. IEEE Trans. Computers 65(3): 860-872 (2016) - [j35]Xinming Chen, Brandon Jones, Michela Becchi, Tilman Wolf:
Picking Pesky Parameters: Optimizing Regular Expression Matching in Practice. IEEE Trans. Parallel Distributed Syst. 27(5): 1430-1442 (2016) - [c103]Jingrui Li, Tilman Wolf:
A One-Way Proof-of-Work Protocol to Protect Controllers in Software-Defined Networks. ANCS 2016: 123-124 - [c102]Hao Cai, Tilman Wolf:
Source Authentication and Path Validation in Networks Using Orthogonal Sequences. ICCCN 2016: 1-10 - [c101]James Griffioen, Tilman Wolf, Kenneth L. Calvert:
A Coin-Operated Software-Defined Exchange. ICCCN 2016: 1-8 - [c100]Tilman Wolf, Jingrui Li:
Denial-of-Service Prevention for Software-Defined Network Controllers. ICCCN 2016: 1-10 - [c99]Qiongwen Xu, Xu Zhang, Jin Zhao, Xin Wang, Tilman Wolf:
Fast shortest-path queries on large-scale graphs. ICNP 2016: 1-10 - [c98]Tilman Wolf, Anna Nagurney:
A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things. IoTDI 2016: 141-151 - [c97]Abhishek Dwaraki, Tilman Wolf:
Adaptive Service-Chain Routing for Virtual Network Functions in Software-Defined Networks. HotMiddlebox@SIGCOMM 2016: 32-37 - 2015
- [j34]Shashank Shanbhag, Arun Reddy Kandoor, Cong Wang, Ramgopal Mettu, Tilman Wolf:
VHub: Single-stage virtual network mapping through hub location. Comput. Networks 77: 169-180 (2015) - [j33]Tilman Wolf, Harikrishnan Kumarapillai Chandrikakutty, Kekai Hu, Deepak Unnikrishnan, Russell Tessier:
Securing Network Processors with High-Performance Hardware Monitors. IEEE Trans. Dependable Secur. Comput. 12(6): 652-664 (2015) - [c96]Abhishek Dwaraki, Srini Seetharaman, Sriram Natarajan, Tilman Wolf:
State Abstraction and Management in Software-Defined Networks. ANCS 2015: 189-190 - [c95]Tedy Thomas, Arman Pouraghily, Kekai Hu, Russell Tessier, Tilman Wolf:
Multi-task support for security-enabled embedded processors. ASAP 2015: 136-143 - [c94]Andres Marentes, Thiago Teixeira, Tilman Wolf:
Exploring economic dynamics in an Internet with service choices. ICC 2015: 5272-5277 - [c93]Xinming Chen, Tilman Wolf, Jim Griffioen, Onur Ascigil, Rudra Dutta, George N. Rouskas, Shireesh Bhat, Ilya Baldin, Kenneth L. Calvert:
Design of a protocol to enable economic transactions for network services. ICC 2015: 5354-5359 - [c92]Xinming Chen, Hao Cai, Tilman Wolf:
Multi-criteria Routing in Networks with Path Choices. ICNP 2015: 334-344 - [c91]Hao Cai, Tilman Wolf:
Source authentication and path validation with orthogonal network capabilities. INFOCOM Workshops 2015: 111-112 - [c90]Renlong Tu, Xin Wang, Jin Zhao, Yue Yang, Lei Shi, Tilman Wolf:
Design of a load-balancing middlebox based on SDN for data centers. INFOCOM Workshops 2015: 480-485 - [c89]Hao Cai, Tilman Wolf:
On 2-way neighbor discovery in wireless networks with directional antennas. INFOCOM 2015: 702-710 - [c88]Pengcheng Wang, Xue Yu, Shuai Chen, Padmaja Duggisetty, Shuo Guo, Tilman Wolf:
Cryptopaper: digital information security for physical documents. SAC 2015: 2157-2164 - [c87]Abhishek Dwaraki, Srini Seetharaman, Sriram Natarajan, Tilman Wolf:
GitFlow: flow revision management for software-defined networks. SOSR 2015: 6:1-6:6 - 2014
- [j32]Tilman Wolf, James Griffioen, Kenneth L. Calvert, Rudra Dutta, George N. Rouskas, Ilya Baldin, Anna Nagurney:
ChoiceNet: toward an economy plane for the internet. Comput. Commun. Rev. 44(3): 58-65 (2014) - [j31]Anna Nagurney, Tilman Wolf:
A Cournot-Nash-Bertrand game theory model of a service-oriented Internet with price and quality competition among network transport providers. Comput. Manag. Sci. 11(4): 475-502 (2014) - [j30]Nauman Javed, Eric Lyons, Michael Zink, Tilman Wolf:
Adaptive wireless mesh networks: Surviving weather without sensing it. Comput. Commun. 54: 120-130 (2014) - [c86]Kekai Hu, Tilman Wolf, Thiago Teixeira, Russell Tessier:
System-Level Security for Network Processors with Hardware Monitors. DAC 2014: 211:1-211:6 - [c85]Peng Wu, Tilman Wolf:
Stack protection in packet processing systems. ICNC 2014: 53-57 - [c84]Karthikeswar Ivaturi, Tilman Wolf:
Mapping of delay-sensitive virtual networks. ICNC 2014: 341-347 - [c83]Hao Cai, Xinming Chen, Tilman Wolf:
OrthCredential: A New Network Capability Design for High-Performance Access Control. ICNP 2014: 233-244 - [c82]Sriram Natarajan, Tilman Wolf:
Network-level privacy for hosted cloud services. NOF 2014: 1-8 - 2013
- [j29]Y. Sinan Hanay, Abhishek Dwaraki, Kekai Hu, Tilman Wolf:
High-performance implementation of in-network traffic pacing for small-buffer networks. Comput. Commun. 36(13): 1450-1459 (2013) - [j28]Tilman Wolf, Sriram Natarajan, Kamlesh T. Vasudevan:
High-Performance Capabilities for 1-Hop Containment of Network Attacks. IEEE/ACM Trans. Netw. 21(6): 1931-1946 (2013) - [c81]Hao Cai, Tilman Wolf:
Design of credentials for high-speed access control in service-oriented networks. ANCS 2013: 119-120 - [c80]Xinming Chen, Brandon Jones, Michela Becchi, Tilman Wolf:
Picking pesky parameters: Optimizing regular expression matching in practice. ANCS 2013: 203-213 - [c79]Kekai Hu, Harikrishnan Chandrikakutty, Russell Tessier, Tilman Wolf:
Scalable hardware monitors to protect network processors from data plane attacks. CNS 2013: 314-322 - [c78]Harikrishnan Chandrikakutty, Deepak Unnikrishnan, Russell Tessier, Tilman Wolf:
High-performance hardware monitors to protect network processors from data plane attacks. DAC 2013: 80:1-80:6 - [c77]Xinming Chen, Danai Chasaki, Tilman Wolf:
External monitoring of highly parallel network processors. HPSR 2013: 197-204 - [c76]Abhishek Dwaraki, Tilman Wolf:
Service Instantiation in an Internet with Choices. ICCCN 2013: 1-7 - [c75]Nauman Javed, Eric Lyons, Michael Zink, Tilman Wolf:
Adaptive Wireless Mesh Networks: Surviving Weather without Sensing It. ICCCN 2013: 1-7 - [c74]Nauman Javed, Tilman Wolf:
Multiple object tracking in sensor networks using distributed clique finding. ICNC 2013: 1139-1145 - [c73]Tilman Wolf, Michael Zink, Anna Nagurney:
The Cyber-Physical Marketplace: A Framework for Large-Scale Horizontal Integration in Distributed Cyber-Physical Systems. ICDCS Workshops 2013: 296-302 - [c72]Tilman Wolf, Lixia Zhang, Zhi-Li Zhang:
Message from the technical program chairs. ICNP 2013: 1 - [c71]George N. Rouskas, Ilia Baldine, Kenneth L. Calvert, Rudra Dutta, Jim Griffioen, Anna Nagurney, Tilman Wolf:
ChoiceNet: Network innovation through choice. ONDM 2013: 1-6 - 2012
- [j27]Danai Chasaki, Tilman Wolf:
Attacks and Defenses in the Data Plane of Networks. IEEE Trans. Dependable Secur. Comput. 9(6): 798-810 (2012) - [j26]Qiang Wu, Tilman Wolf:
Runtime Task Allocation in Multicore Packet Processing Systems. IEEE Trans. Parallel Distributed Syst. 23(10): 1934-1943 (2012) - [c70]Xinming Chen, Tilman Wolf:
Extensible hierarchical simulation of network systems. ANCS 2012: 141-142 - [c69]Xinming Chen, Abhishek Dwaraki, Hao Cai, Tilman Wolf:
Specification and composition of network services in future internet architectures. StudentWorkshop@CoNEXT 2012: 45-46 - [c68]Vikram Desai, Sriram Natarajan, Tilman Wolf:
Packet forwarding misbehavior detection in next-generation networks. ICC 2012: 846-851 - [c67]Y. Sinan Hanay, Wei Li, Russell Tessier, Tilman Wolf:
Saving energy and improving TCP throughput with rate adaptation in Ethernet. ICC 2012: 1249-1254 - [c66]Cong Wang, Shashank Shanbhag, Tilman Wolf:
Virtual network mapping with traffic matrices. ICC 2012: 2717-2722 - [c65]Jin Zhu, Tilman Wolf:
VNMBench: A Benchmark for Virtual Network Mapping Algorithms. ICCCN 2012: 1-8 - [c64]Sriram Natarajan, Tilman Wolf:
Security issues in network virtualization for the future Internet. ICNC 2012: 537-543 - [c63]Sriram Natarajan, Xin Huang, Tilman Wolf:
Efficient conflict detection in flow-based virtualized networks. ICNC 2012: 690-696 - [c62]Nauman Javed, Tilman Wolf:
Automated Sensor Verification Using Outlier Detection in the Internet of Things. ICDCS Workshops 2012: 291-296 - [c61]Tilman Wolf, James Griffioen, Kenneth L. Calvert, Rudra Dutta, George N. Rouskas, Ilia Baldine, Anna Nagurney:
Choice as a principle in network architecture. SIGCOMM 2012: 105-106 - [e2]Tilman Wolf, Andrew W. Moore, Viktor K. Prasanna:
Symposium on Architecture for Networking and Communications Systems, ANCS '12, Austin, TX, USA - October 29 - 30, 2012. ACM 2012, ISBN 978-1-4503-1685-9 [contents] - 2011
- [j25]Lars Eggert, Tilman Wolf:
Special Issue on Architectures and Protocols for the Future Internet. Comput. Networks 55(4): 891-892 (2011) - [j24]Tilman Wolf, Russell Tessier, Gayatri Prabhu:
Securing the data path of next-generation router systems. Comput. Commun. 34(4): 598-606 (2011) - [j23]Yan Cai, Tilman Wolf, Weibo Gong:
Delaying Transmissions in Data Communication Networks to Improve Transport-Layer Performance. IEEE J. Sel. Areas Commun. 29(5): 916-927 (2011) - [j22]Shashank Shanbhag, Tilman Wolf:
Automated composition of data-path functionality in the future internet. IEEE Netw. 25(6): 8-14 (2011) - [c60]Danai Chasaki, Qiang Wu, Tilman Wolf:
Inferring Packet Processing Behavior Using Input/Output Monitors. ANCS 2011: 91-92 - [c59]Sriram Natarajan, Tilman Wolf:
Encrypted Packet Forwarding in Virtualized Networks. ANCS 2011: 213-214 - [c58]Cong Wang, Tilman Wolf:
Virtual Network Mapping with Traffic Matrices. ANCS 2011: 225-226 - [c57]Y. Sinan Hanay, Abhishek Dwaraki, Tilman Wolf:
High-performance implementation of in-network traffic pacing. HPSR 2011: 9-15 - [c56]Yan Cai, Y. Sinan Hanay, Tilman Wolf:
A Study of the Impact of Network Traffic Pacing from Network and End-User Perspectives. ICCCN 2011: 1-6 - [c55]Danai Chasaki, Qiang Wu, Tilman Wolf:
Attacks on Network Infrastructure. ICCCN 2011: 1-8 - 2010
- [j21]Tilman Wolf:
In-network services for customization in next-generation networks. IEEE Netw. 24(4): 6-12 (2010) - [j20]Shufu Mao, Tilman Wolf:
Hardware Support for Secure Processing in Embedded Systems. IEEE Trans. Computers 59(6): 847-854 (2010) - [j19]Tilman Wolf:
Assessing Student Learning in a Virtual Laboratory Environment. IEEE Trans. Educ. 53(2): 216-222 (2010) - [c54]Qiang Wu, Shashank Shanbhag, Tilman Wolf:
Fair multithreading on packet processors for scalable network virtualization. ANCS 2010: 1 - [c53]Danai Chasaki, Tilman Wolf:
Design of a secure packet processor. ANCS 2010: 3 - [c52]Danai Chasaki, Tilman Wolf:
Fast regular expression matching in hardware using NFA-BDD combination. ANCS 2010: 12 - [c51]Qiang Wu, Dilip Joy Mampilly, Tilman Wolf:
Distributed runtime load-balancing for software routers on homogeneous many-core processors. PRESTO@CoNEXT 2010: 1:1-1:6 - [c50]Qiang Wu, Danai Chasaki, Tilman Wolf:
Implementation of a simplified network processor. HPSR 2010: 7-13 - [c49]Tilman Wolf, Soumya Mahadevan:
Convergence of Communication and Processing in Next-Generation Networks. ICC 2010: 1-6 - [c48]Qiang Wu, Tilman Wolf:
Data Path Management in Mesh-Based Programmable Routers. ICC 2010: 1-6 - [c47]Xin Huang, Shashank Shanbhag, Tilman Wolf:
Automated Service Composition and Routing in Networks with Data-Path Services. ICCCN 2010: 1-8 - [c46]Shashank Shanbhag, Yu Gu, Tilman Wolf:
A Taxonomy and Comparative Evaluation of Algorithms for Parallel Anomaly Detection. ICCCN 2010: 1-8 - [c45]Yan Cai, Bo Jiang, Tilman Wolf, Weibo Gong:
A Practical On-line Pacing Scheme at Edges of Small Buffer Networks. INFOCOM 2010: 1424-1432 - [c44]Shashank Shanbhag, Tilman Wolf:
Enforcement of Data-Plane Policies in Next-Generation Networks. POLICY 2010: 137-140
2000 – 2009
- 2009
- [j18]Sameer Ladiwala, Ramaswamy Ramaswamy, Tilman Wolf:
Transparent TCP acceleration. Comput. Commun. 32(4): 691-702 (2009) - [j17]Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf:
Analysis of network processing workloads. J. Syst. Archit. 55(10-12): 421-433 (2009) - [j16]Shashank Shanbhag, Tilman Wolf:
Accurate anomaly detection through parallelism. IEEE Netw. 23(1): 22-28 (2009) - [j15]Ning Weng, Tilman Wolf:
Analytic modeling of network processors for parallel workload mapping. ACM Trans. Embed. Comput. Syst. 8(3): 18:1-18:29 (2009) - [c43]Qiang Wu, Danai Chasaki, Tilman Wolf:
Simplifying data path processing in next-generation routers. ANCS 2009: 11-19 - [c42]Xin Huang, Shashank Shanbhag, Tilman Wolf:
Interfacing to a virtualized network infrastructure through network service abstractions. ANCS 2009: 169-170 - [c41]Yan Cai, Yong Liu, Weibo Gong, Tilman Wolf:
Impact of arrival burstiness on queue length: An infinitesimal perturbation analysis. CDC 2009: 7068-7073 - [c40]Shashank Shanbhag, Tilman Wolf:
AnomBench: A Benchmark for Volume-Based Internet Anomaly Detection. GLOBECOM 2009: 1-6 - [c39]Yan Cai, Y. Sinan Hanay, Tilman Wolf:
Practical Packet Pacing in Small-Buffer Networks. ICC 2009: 1-6 - [c38]Xin Huang, Sivakumar Ganapathy, Tilman Wolf:
Evaluating Algorithms for Composable Service Placement in Computer Networks. ICC 2009: 1-6 - [c37]Qiang Wu, Tilman Wolf:
Support for Dynamic Adaptation in Next Generation Packet Processing Systems. ICC 2009: 1-6 - [c36]Shashank Shanbhag, Xin Huang, Santosh Proddatoori, Tilman Wolf:
Automated Service Composition in Next-Generation Networks. ICDCS Workshops 2009: 245-250 - [c35]Tilman Wolf, Russell Tessier:
Design of a Secure Router System for Next-Generation Networks. NSS 2009: 52-59 - [c34]Qiang Wu, Tilman Wolf:
Design of a network service processing platform for data path customization. PRESTO 2009: 31-36 - [e1]Lars Eggert, Tilman Wolf:
Proceedings of the 2009 workshop on Re-architecting the internet, ReArch@CoNEXT 2009, Rome, Italy, December 1, 2009. ACM 2009, ISBN 978-1-60558-749-3 [contents] - 2008
- [j14]Tilman Wolf, Sri Parameswaran:
Guest editorial for special issue on embedded system security. Des. Autom. Embed. Syst. 12(3): 171-172 (2008) - [j13]Sri Parameswaran, Tilman Wolf:
Embedded systems security - an overview. Des. Autom. Embed. Syst. 12(3): 173-183 (2008) - [j12]Xin Huang, Tilman Wolf:
Evaluating Dynamic Task Mapping in Network Processor Runtime Systems. IEEE Trans. Parallel Distributed Syst. 19(8): 1086-1098 (2008) - [j11]Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-Philippe Diguet, Lilian Bossuet, Romain Vaslin:
Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective. IEEE Trans. Very Large Scale Integr. Syst. 16(2): 144-155 (2008) - [c33]Qiang Wu, Tilman Wolf:
On runtime management in multi-core packet processing systems. ANCS 2008: 69-78 - [c32]Tilman Wolf:
Data path credentials for high-performance capabilities-based networks. ANCS 2008: 129-130 - [c31]Shashank Shanbhag, Tilman Wolf:
Implementation of end-to-end abstractions in a network service architecture. CoNEXT 2008: 16 - [c30]Shashank Shanbhag, Tilman Wolf:
Evaluation of an Online Parallel Anomaly Detection System. GLOBECOM 2008: 2040-2045 - [c29]Xin Huang, Sivakumar Ganapathy, Tilman Wolf:
A Framework for Network State Management in the Next-Generation Internet Architecture. GLOBECOM 2008: 2259-2263 - [c28]Xin Huang, Sivakumar Ganapathy, Tilman Wolf:
A Distributed Routing Algorithm for Networks with Data-Path Services. ICCCN 2008: 68-74 - [c27]Shashank Shanbhag, Tilman Wolf:
Massively Parallel Anomaly Detection in Online Network Measurement. ICCCN 2008: 261-266 - [c26]Xin Huang, Sivakumar Ganapathy, Tilman Wolf:
A scalable distributed routing protocol for networks with data-path services. ICNP 2008: 318-327 - [c25]Charlie Wiseman, Ken Wong, Tilman Wolf, Sergey Gorinsky:
Operational experience with a virtual networking laboratory. SIGCSE 2008: 427-431 - 2007
- [j10]Tilman Wolf:
Notes from the SIGCOMM business meeting 2006. Comput. Commun. Rev. 37(1): 85 (2007) - [j9]Tilman Wolf, Ning Weng:
Runtime Support for Multicore Packet Processing Systems. IEEE Netw. 21(4): 29-37 (2007) - [j8]Ramaswamy Ramaswamy, Tilman Wolf:
High-speed prefix-preserving IP address anonymization for passive measurement systems. IEEE/ACM Trans. Netw. 15(1): 26-39 (2007) - [c24]Tilman Wolf:
Design of a network architecture with inherent data path security. ANCS 2007: 39-40 - [c23]Xin Huang, Tilman Wolf:
A next generation internet state management framework. CoNEXT 2007: 77 - [c22]Shufu Mao, Tilman Wolf:
Hardware Support for Secure Processing in Embedded Systems. DAC 2007: 483-488 - [c21]Sivakumar Ganapathy, Tilman Wolf:
Design of a Network Service Architecture. ICCCN 2007: 754-759 - [c20]Qiang Wu, Yong Liao, Tilman Wolf, Lixin Gao:
Benchmarking BGP Routers. IISWC 2007: 79-88 - [c19]Tilman Wolf:
Assessing the impact of inking technology in a large digital design course. SIGCSE 2007: 79-83 - [c18]Ken Wong, Tilman Wolf, Sergey Gorinsky, Jonathan S. Turner:
Teaching experiences with a virtual network laboratory. SIGCSE 2007: 481-485 - 2006
- [j7]Tilman Wolf, Mark A. Franklin:
Performance Models for Network Processor Design. IEEE Trans. Parallel Distributed Syst. 17(6): 548-561 (2006) - [c17]Xin Huang, Tilman Wolf:
A methodology for evaluating runtime support in network processors. ANCS 2006: 113-122 - [c16]Guy Gogniat, Tilman Wolf, Wayne P. Burleson:
Reconfigurable Security Support for Embedded Systems. HICSS 2006 - [c15]Tilman Wolf:
Service-Centric End-to-End Abstractions in Next-Generation Networks. ICCCN 2006: 79-86 - [c14]Tilman Wolf, Ramaswamy Ramaswamy, Siddhartha Bung, Ning Yang:
An Architecture for Distributed Real-Time Passive Network Measurement. MASCOTS 2006: 335-344 - 2005
- [c13]Tilman Wolf, Ning Weng, Chia-Hui Tai:
Design considerations for network processor operating systems. ANCS 2005: 71-80 - [c12]Tilman Wolf, Shulin You, Ramaswamy Ramaswamy:
Transparent TCP acceleration through network processing. GLOBECOM 2005: 5 - [c11]Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf:
Analysis of Network Processing Workloads. ISPASS 2005: 226-235 - [c10]Guy Gogniat, Tilman Wolf, Wayne P. Burleson:
Reconfigurable Security Primitive for Embedded Systems. SoC 2005: 23-28 - [c9]Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf:
A Network Processor Based Passive Measurement Node. PAM 2005: 337-340 - [c8]Ning Weng, Tilman Wolf:
Profiling and mapping of parallel workloads on network processors. SAC 2005: 890-896 - 2004
- [c7]Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf:
Characterizing network processing delay. GLOBECOM 2004: 1629-1634 - 2003
- [j6]Sumi Choi, Jonathan S. Turner, Tilman Wolf:
Configuring sessions in programmable networks. Comput. Networks 41(2): 269-284 (2003) - [j5]Tilman Wolf, Prashanth Pappu, Mark A. Franklin:
Predictive scheduling of network processors. Comput. Networks 41(5): 601-621 (2003) - [j4]Tilman Wolf, Sumi Choi:
Aggregated hierarchical multicast-a many-to-many communication paradigm using programmable networks. IEEE Trans. Syst. Man Cybern. Part C 33(3): 358-369 (2003) - [c6]Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf:
Considering processing cost in network simulations. MoMeTools@SIGCOMM 2003: 47-56 - 2002
- [j3]Tilman Wolf:
Network processors: flexibility and performance for next-generation networks. Comput. Commun. Rev. 32(1): 65 (2002) - [c5]Tilman Wolf, Mark A. Franklin:
Design Tradeoffs for Embedded Network Processors. ARCS 2002: 149-164 - [c4]Prashanth Pappu, Tilman Wolf:
Scheduling Processing Resources in Programmable Routers. INFOCOM 2002: 104-112 - 2001
- [j2]Tilman Wolf, Jonathan S. Turner:
Design issues for high-performance active routers. IEEE J. Sel. Areas Commun. 19(3): 404-409 (2001) - [c3]Sumi Choi, Jonathan S. Turner, Tilman Wolf:
Configuring Sessions in Programmable Networks. INFOCOM 2001: 60-66 - [c2]Tilman Wolf, Mark A. Franklin:
Locality-aware predictive scheduling of network processors. ISPASS 2001: 152-159 - 2000
- [c1]Tilman Wolf, Mark A. Franklin:
CommBench-a telecommunications benchmark for network processors. ISPASS 2000: 154-162
1990 – 1999
- 1999
- [j1]Dan Decasper, Bernhard Plattner, Guru M. Parulkar, Sumi Choi, John D. DeHart, Tilman Wolf:
A scalable high-performance active network node. IEEE Netw. 13(1): 8-19 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint