Search

Your search keyword '"Carle, Georg"' showing total 1,122 results

Search Constraints

Start Over You searched for: Author "Carle, Georg" Remove constraint Author: "Carle, Georg"
1,122 results on '"Carle, Georg"'

Search Results

1. ECSeptional DNS Data: Evaluating Nameserver ECS Deployments with Response-Aware Scanning

2. Lazy Eye Inspection: Capturing the State of Happy Eyeballs Implementations

3. A Quantum of QUIC: Dissecting Cryptography with Post-Quantum Insights

4. A Privacy-Preserving Log-Rank Test for the Kaplan-Meier Estimator With Secure Multiparty Computation: Algorithm Development and Validation

5. Fast and Scalable Network Slicing by Integrating Deep Learning with Lagrangian Methods

6. Real-Time Performance of OPC UA

7. Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns

8. Multilayer Environment and Toolchain for Holistic NetwOrk Design and Analysis

9. QUIC on the Highway: Evaluating Performance on High-rate Links

10. EDGAR: An Autonomous Driving Research Platform -- From Feature Development to Real-World Application

11. A First Look at SVCB and HTTPS DNS Resource Records in the Wild

12. Evaluating the Benefits: Quantifying the Effects of TCP Options, QUIC, and CDNs on Throughput

13. Advancing Federated Learning in 6G: A Trusted Architecture with Graph-based Analysis

14. QUIC Hunter: Finding QUIC Deployments and Identifying Server Libraries Across the Internet

15. Target Acquired? Evaluating Target Generation Algorithms for IPv6

16. Inter-Cell Network Slicing With Transfer Learning Empowered Multi-Agent Deep Reinforcement Learning

17. Network Slicing via Transfer Learning aided Distributed Deep Reinforcement Learning

18. QUIC Hunter: Finding QUIC Deployments and Identifying Server Libraries Across the Internet

19. Rusty Clusters? Dusting an IPv6 Research Foundation

20. Waiting for QUIC: On the Opportunities of Passive Measurements to Understand QUIC Deployments

21. Towards a Tectonic Traffic Shift? Investigating Apple's New Relay Network

23. Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale

24. High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings

26. CRGC -- A Practical Framework for Constructing Reusable Garbled Circuits

27. Inter-Cell Slicing Resource Partitioning via Coordinated Multi-Agent Deep Reinforcement Learning

30. A Distributed Intelligence Architecture for B5G Network Automation

31. Decorrelating Adversarial Nets for Clustering Mobile Network Data

32. Neural Network-based Quantization for Network Automation

33. DissecTLS: A Scalable Active Scanner for TLS Server Configurations, Capabilities, and TLS Fingerprinting

34. RAN Cognitive Controller

35. Digital Contact Tracing Service: An improved decentralized design for privacy and effectiveness

36. Hardening X.509 Certificate Issuance using Distributed Ledger Technology

37. Me Love (SYN-)Cookies: SYN Flood Mitigation in Programmable Data Planes

38. On the Necessity and Design of Coordination Mechanism for Cognitive Autonomous Networks

39. A Generalized TDoA/ToA Model for ToF Positioning

40. Clock Error Analysis of Common Time of Flight based Positioning Methods

41. 5G QoS: Impact of Security Functions on Latency

42. The Case for Writing Network Drivers in High-Level Programming Languages

43. Galois Field Arithmetics for Linear Network Coding using AVX512 Instruction Set Extensions

44. Next Generation Resilient Cyber-Physical Systems

45. Optimally Self-Healing IoT Choreographies

46. DTLS Performance - How Expensive is Security?

47. Multi-party authorization and conflict mediation for decentralized configuration management processes

48. Agile Network Access Control in the Container Age

49. User Space Network Drivers

50. Data Querying and Access Control for Secure Multiparty Computation

Catalog

Books, media, physical & digital resources