The SCEAS System
Navigation Menu

Search the dblp DataBase


Tilman Wolf: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tilman Wolf, Mark A. Franklin
    Design Tradeoffs for Embedded Network Processors. [Citation Graph (0, 0)][DBLP]
    ARCS, 2002, pp:149-164 [Conf]
  2. Guy Gogniat, Tilman Wolf, Wayne Burleson
    Reconfigurable Security Support for Embedded Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  3. Sumi Choi, Jonathan S. Turner, Tilman Wolf
    Configuring Sessions in Programmable Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:60-66 [Conf]
  4. Prashanth Pappu, Tilman Wolf
    Scheduling Processing Resources in Programmable Routers. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2002, pp:- [Conf]
  5. Tilman Wolf, Ramaswamy Ramaswamy, Siddhartha Bung, Ning Yang
    An Architecture for Distributed Real-Time Passive Network Measurement. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2006, pp:335-344 [Conf]
  6. Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf
    A Network Processor Based Passive Measurement Node. [Citation Graph (0, 0)][DBLP]
    PAM, 2005, pp:337-340 [Conf]
  7. Ning Weng, Tilman Wolf
    Profiling and mapping of parallel workloads on network processors. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:890-896 [Conf]
  8. Ken Wong, Tilman Wolf, Sergey Gorinsky, Jonathan S. Turner
    Teaching experiences with a virtual network laboratory. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2007, pp:481-485 [Conf]
  9. Tilman Wolf
    Assessing the impact of inking technology in a large digital design course. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2007, pp:79-83 [Conf]
  10. Tilman Wolf, Ning Weng, Chia-Hui Tai
    Design considerations for network processor operating systems. [Citation Graph (0, 0)][DBLP]
    ANCS, 2005, pp:71-80 [Conf]
  11. Xin Huang, Tilman Wolf
    A methodology for evaluating runtime support in network processors. [Citation Graph (0, 0)][DBLP]
    ANCS, 2006, pp:113-122 [Conf]
  12. Tilman Wolf
    Network processors: flexibility and performance for next-generation networks. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:1, pp:65- [Journal]
  13. Tilman Wolf
    Notes from the SIGCOMM business meeting 2006. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2007, v:37, n:1, pp:85- [Journal]
  14. Sumi Choi, Jonathan S. Turner, Tilman Wolf
    Configuring sessions in programmable networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:41, n:2, pp:269-284 [Journal]
  15. Tilman Wolf, Prashanth Pappu, Mark A. Franklin
    Predictive scheduling of network processors. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:41, n:5, pp:601-621 [Journal]
  16. Tilman Wolf, Mark A. Franklin
    Performance Models for Network Processor Design. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:6, pp:548-561 [Journal]
  17. Tilman Wolf, Sumi Choi
    Aggregated hierarchical multicast-a many-to-many communication paradigm using programmable networks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:358-369 [Journal]
  18. Shufu Mao, Tilman Wolf
    Hardware Support for Secure Processing in Embedded Systems. [Citation Graph (0, 0)][DBLP]
    DAC, 2007, pp:483-488 [Conf]
  19. Ramaswamy Ramaswamy, Tilman Wolf
    High-speed prefix-preserving IP address anonymization for passive measurement systems. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2007, v:15, n:1, pp:26-39 [Journal]

  20. Practical Packet Pacing in Small-Buffer Networks. [Citation Graph (, )][DBLP]

  21. Support for Dynamic Adaptation in Next Generation Packet Processing Systems. [Citation Graph (, )][DBLP]

  22. Evaluating Algorithms for Composable Service Placement in Computer Networks. [Citation Graph (, )][DBLP]

  23. Design of a Network Service Architecture. [Citation Graph (, )][DBLP]

  24. Massively Parallel Anomaly Detection in Online Network Measurement. [Citation Graph (, )][DBLP]

  25. A Distributed Routing Algorithm for Networks with Data-Path Services. [Citation Graph (, )][DBLP]

  26. Automated Service Composition in Next-Generation Networks. [Citation Graph (, )][DBLP]

  27. A Practical On-line Pacing Scheme at Edges of Small Buffer Networks. [Citation Graph (, )][DBLP]

  28. Analysis of Network Processing Workloads. [Citation Graph (, )][DBLP]

  29. Design of a network service processing platform for data path customization. [Citation Graph (, )][DBLP]

  30. Operational experience with a virtual networking laboratory. [Citation Graph (, )][DBLP]

  31. Design of a network architecture with inherent data path security. [Citation Graph (, )][DBLP]

  32. Data path credentials for high-performance capabilities-based networks. [Citation Graph (, )][DBLP]

  33. On runtime management in multi-core packet processing systems. [Citation Graph (, )][DBLP]

  34. A Framework for Network State Management in the Next-Generation Internet Architecture. [Citation Graph (, )][DBLP]

  35. Evaluation of an Online Parallel Anomaly Detection System. [Citation Graph (, )][DBLP]

  36. AnomBench: A Benchmark for Volume-Based Internet Anomaly Detection. [Citation Graph (, )][DBLP]

  37. A next generation internet state management framework. [Citation Graph (, )][DBLP]

  38. Implementation of end-to-end abstractions in a network service architecture. [Citation Graph (, )][DBLP]

  39. Impact of arrival burstiness on queue length: An infinitesimal perturbation analysis. [Citation Graph (, )][DBLP]

  40. Design of a Secure Router System for Next-Generation Networks. [Citation Graph (, )][DBLP]

  41. Transparent TCP acceleration. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002