Search
Add filters:
Use filters to refine the search results.
Item hits:
Publication Date | Article Title | Author(s) |
---|---|---|
13-Jan-2022 | Higher order RG flow on the Wilson line in $$ \mathcal{N} $$ = 4 SYM | Beccaria, M; Giombi, Simone; Tseytlin, AA |
2020 | Towards Non-interactive Witness Hiding | Kuykendall, Benjamin; Zhandry, Mark |
2013 | Composing Software Defined Networks | Monsanto, Christopher; Reich, Joshua; Foster, Nate; Rexford, Jennifer; Walker, David |
2021 | Securing internet applications from routing attacks | Sun, Yixin; Apostolaki, Maria; Birge-Lee, Henry; Vanbever, Laurent; Rexford, Jennifer, et al |
2021 | Revitalizing the public internet by making it extensible | Balakrishnan, Hari; Banerjee, Sujata; Cidon, Israel; Culler, David; Estrin, Deborah, et al |
2020 | Tracking P4 Program Execution in the Data Plane | Kodeswaran, Suriya; Arashloo, Mina T; Tammana, Praveen; Rexford, Jennifer |
2014 | Compositional Network Mobility | Zave, Pamela; Rexford, Jennifer |
2020 | Towards Understanding Hierarchical Learning: Benefits of Neural Representations | Chen, Minshuo; Bai, Yu; Lee, Jason D; Zhao, Tuo; Wang, Huan, et al |
2012 | Virtual Switching Without a Hypervisor for a More Secure Cloud | Jin, Xin; Keller, Eric; Rexford, Jennifer |
2019 | Reflections on a clean slate 4D approach to network control and management | Greenberg, Albert; Maltz, David A; Rexford, Jennifer; Xie, Geoffrey; Zhan, Jibin, et al |