yiannis-pubs.bib

@inproceedings{yiakoumis2016neutral,
  title = {Neutral Net Neutrality},
  author = {Yiakoumis, Yiannis and Katti, Sachin and McKeown, Nick},
  booktitle = {Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference},
  pages = {483--496},
  year = {2016},
  organization = {ACM},
  pdf = {docs/sigcomm-neutrality.pdf}
}
@inproceedings{UserDrivenNetworks,
  author = {Yiakoumis, Yiannis and Huang, Te-Yuan and Yap, Kok-Kiong and Katti, Sachin and Johari, Ramesh and McKeown, Nick},
  title = {Putting Home Users in Charge of their Network},
  booktitle = {Proceedings of the 2012 ACM Ubicomp workshop on Systems and
                  Infrastructure for the Digital Home},
  series = {HomeSys '12},
  year = {2012},
  location = {Pittsburgh, USA},
  publisher = {ACM},
  address = {New York, NY, USA},
  pdf = {docs/homesys2012.pdf}
}
@inproceedings{SlicingHomeNetworks,
  author = {Yiakoumis, Yiannis and Yap, Kok-Kiong and Katti, Sachin and Parulkar, Guru and McKeown, Nick},
  title = {Slicing Home Networks},
  booktitle = {Proceedings of the 2011 ACM SIGCOMM workshop on Home networks},
  series = {HomeNets '11},
  year = {2011},
  location = {Toronto, Canada},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {home networking, network security, programmable networking},
  pdf = {docs/slicing-homes.pdf}
}
@article{Sherwood:2010:CRS:1672308.1672333,
  author = {Sherwood, Rob and Chan, Michael and Covington, Adam and Gibb, Glen and Flajslik, Mario and Handigol, Nikhil and Huang, Te-Yuan and Kazemian, Peyman and Kobayashi, Masayoshi and Naous, Jad and Seetharaman, Srinivasan and Underhill, David and Yabe, Tatsuya and Yap, Kok-Kiong and Yiakoumis, Yiannis and Zeng, Hongyi and Appenzeller, Guido and Johari, Ramesh and McKeown, Nick and Parulkar, Guru},
  title = {Carving research slices out of your production networks with OpenFlow},
  journal = {SIGCOMM Comput. Commun. Rev.},
  volume = {40},
  issue = {1},
  month = {January},
  year = {2010},
  issn = {0146-4833},
  pages = {129--130},
  numpages = {2},
  url = {http://doi.acm.org/10.1145/1672308.1672333},
  doi = {http://doi.acm.org/10.1145/1672308.1672333},
  acmid = {1672333},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {architecture, flowvisor, openflow, slicing, virtual networks},
  pdf = {docs/ccr-fv.pdf}
}
@inproceedings{Heller:2010:ESE:1855711.1855728,
  author = {Heller, Brandon and Seetharaman, Srini and Mahadevan, Priya and Yiakoumis, Yiannis and Sharma, Puneet and Banerjee, Sujata and McKeown, Nick},
  title = {ElasticTree: saving energy in data center networks},
  booktitle = {Proceedings of the 7th USENIX conference on Networked systems design and implementation},
  series = {NSDI'10},
  year = {2010},
  location = {San Jose, California},
  pages = {17--17},
  numpages = {1},
  url = {http://portal.acm.org/citation.cfm?id=1855711.1855728},
  acmid = {1855728},
  publisher = {USENIX Association},
  address = {Berkeley, CA, USA},
  pdf = {docs/elastic-tree.pdf}
}
@inproceedings{5875210,
  author = {Das, Saurav and Yiakoumis, Yiannis and Parulkar, Guru and McKeown, Nick and Singh, Preeti and Getachew, Daniel and Desai, Premal Dinesh},
  booktitle = {Optical Fiber Communication Conference and Exposition (OFC/NFOEC), 2011 and the National Fiber Optic Engineers Conference},
  title = {Application-aware aggregation and traffic engineering in a converged packet-circuit network},
  year = {2011},
  month = {march},
  volume = {},
  number = {},
  pages = {1 -3},
  keywords = {},
  doi = {},
  issn = {pending},
  pdf = {docs/pac-circ.pdf}
}
@inproceedings{1630347,
  author = {Yiakoumis, I. and Papadonikolakis, M. and Michail, H. and Kakarountas, A.P. and Goutis, C.E.},
  booktitle = {Computer as a Tool, 2005. EUROCON 2005.The International Conference on},
  title = {Efficient Small-Sized Implementation of the Keyed-Hash Message Authentication Code},
  year = {2005},
  month = {nov.},
  volume = {2},
  number = {},
  pages = {1875 -1878},
  keywords = {HMAC-MD5;HMAC-SHA1;IEEE 802.11n;VLSI implementation;hash function;keyed-hash message authentication code;security;telecommunication applications;virtual private networks;VLSI;cryptography;message authentication;telecommunication security;},
  doi = {10.1109/EURCON.2005.1630347},
  issn = {},
  pdf = {docs/eurocon.pdf}
}
@article{1649004,
  author = {Yiakoumis, I.I. and Papadonikolakis, M.E. and Michail, H.E. and Kakarountas, A.P. and Goutis, C.E.},
  journal = {Potentials, IEEE},
  title = {Maximizing the hash function of authentication codes},
  year = {2006},
  month = {march-april},
  volume = {25},
  number = {2},
  pages = { 9 - 12},
  keywords = { HMAC; Xilinx Virtex-E FPGA family; authentication codes; hash function; keyed-hash message authentication code; prototype board; code standards; codes; cryptography; field programmable gate arrays; message authentication;},
  doi = {10.1109/MP.2006.1649004},
  issn = {0278-6648},
  pdf = {docs/potentials.pdf}
}