default search action
Katerina J. Argyraki
Person information
- affiliation: Swiss Federal Institute of Technology in Lausanne, Switzerland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c45]Rishabh R. Iyer, Katerina J. Argyraki, George Candea:
Automatically Reasoning About How Systems Code Uses the CPU Cache. OSDI 2024: 581-598 - 2023
- [c44]Muhammad Abdullah, Pavlos Nikolopoulos, Katerina J. Argyraki:
Caching and Neutrality. HotNets 2023: 63-69 - [c43]Catalina Álvarez, Katerina J. Argyraki:
Learning a QoE Metric from Social Media and Gaming Footage. HotNets 2023: 117-123 - [c42]Rishabh R. Iyer, Jiacheng Ma, Katerina J. Argyraki, George Candea, Sylvia Ratnasamy:
The Case for Performance Interfaces for Hardware Accelerators. HotOS 2023: 38-45 - [c41]Zeinab Shmeis, Muhammad Abdullah, Pavlos Nikolopoulos, Katerina J. Argyraki, David R. Choffnes, Phillipa Gill:
Localizing Traffic Differentiation. IMC 2023: 591-605 - [c40]Catalina Álvarez, Katerina J. Argyraki:
Using Gaming Footage as a Source of Internet Latency Information. IMC 2023: 606-626 - 2022
- [c39]Rishabh R. Iyer, Katerina J. Argyraki, George Candea:
Performance Interfaces for Network Functions. NSDI 2022: 567-584 - [c38]Solal Pirelli, Akvile Valentukonyte, Katerina J. Argyraki, George Candea:
Automated Verification of Network Function Binaries. NSDI 2022: 585-600 - 2021
- [c37]Mia Primorac, Katerina J. Argyraki, Edouard Bugnion:
When to Hedge in Interactive Services. NSDI 2021: 373-387
2010 – 2019
- 2019
- [j12]Pavlos Nikolopoulos, Christos Pappas, Katerina J. Argyraki, Adrian Perrig:
Retroactive Packet Sampling for Traffic Receipts. Proc. ACM Meas. Anal. Comput. Syst. 3(1): 19:1-19:39 (2019) - [j11]Georgia Fragkouli, Katerina J. Argyraki, Bryan Ford:
MorphIT: Morphing Packet Reports for Internet Transparency. Proc. Priv. Enhancing Technol. 2019(2): 88-104 (2019) - [c36]Rishabh R. Iyer, Luis Pedrosa, Arseniy Zaostrovnykh, Solal Pirelli, Katerina J. Argyraki, George Candea:
Performance Contracts for Software Network Functions. NSDI 2019: 517-530 - [c35]Pavlos Nikolopoulos, Christos Pappas, Katerina J. Argyraki, Adrian Perrig:
Retroactive Packet Sampling for Traffic Receipts. SIGMETRICS (Abstracts) 2019: 17-18 - [c34]Arseniy Zaostrovnykh, Solal Pirelli, Rishabh R. Iyer, Matteo Rizzo, Luis Pedrosa, Katerina J. Argyraki, George Candea:
Verifying software network functions with no verification expertise. SOSP 2019: 275-290 - 2018
- [c33]Amin Tootoonchian, Aurojit Panda, Chang Lan, Melvin Walls, Katerina J. Argyraki, Sylvia Ratnasamy, Scott Shenker:
ResQ: Enabling SLOs in Network Function Virtualization. NSDI 2018: 283-297 - [c32]Luis Pedrosa, Rishabh R. Iyer, Arseniy Zaostrovnykh, Jonas Fietz, Katerina J. Argyraki:
Automated synthesis of adversarial workloads for network functions. SIGCOMM 2018: 372-385 - 2017
- [j10]Mia Primorac, Edouard Bugnion, Katerina J. Argyraki:
How to Measure the Killer Microsecond. Comput. Commun. Rev. 47(5): 61-66 (2017) - [c31]Tina Fang, Martin Jaggi, Katerina J. Argyraki:
Generating Steganographic Text with LSTMs. ACL (Student Research Workshop) 2017: 100-106 - [c30]Aurojit Panda, Ori Lahav, Katerina J. Argyraki, Mooly Sagiv, Scott Shenker:
Verifying Reachability in Networks with Mutable Datapaths. NSDI 2017: 699-718 - [c29]Mia Primorac, Edouard Bugnion, Katerina J. Argyraki:
How to Measure the Killer Microsecond. KBNets@SIGCOMM 2017: 37-42 - [c28]Arseniy Zaostrovnykh, Solal Pirelli, Luis Pedrosa, Katerina J. Argyraki, George Candea:
A Formally Verified NAT. SIGCOMM 2017: 141-154 - [i10]Tina Fang, Martin Jaggi, Katerina J. Argyraki:
Generating Steganographic Text with LSTMs. CoRR abs/1705.10742 (2017) - 2016
- [j9]Iris Safaka, László Czap, Katerina J. Argyraki, Christina Fragouli:
Creating Secrets Out of Packet Erasures. IEEE Trans. Inf. Forensics Secur. 11(6): 1177-1191 (2016) - [c27]Jonas Fietz, Sam Whitlock, George Ioannidis, Katerina J. Argyraki, Edouard Bugnion:
VNToR: Network Virtualization at the Top-of-Rack Switch. SoCC 2016: 428-441 - [c26]Iris Safaka, Christina Fragouli, Katerina J. Argyraki:
Matryoshka: Hiding Secret Communication in Plain Sight. FOCI 2016 - [e2]Katerina J. Argyraki, Rebecca Isaacs:
13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016, Santa Clara, CA, USA, March 16-18, 2016. USENIX Association 2016, ISBN 978-1-931971-29-4 [contents] - [i9]Aurojit Panda, Ori Lahav, Katerina J. Argyraki, Mooly Sagiv, Scott Shenker:
Verifying Reachability in Networks with Mutable Datapaths. CoRR abs/1607.00991 (2016) - 2015
- [j8]Mihai Dobrescu, Katerina J. Argyraki:
Software dataplane verification. Commun. ACM 58(11): 113-121 (2015) - [c25]Christos Pappas, Katerina J. Argyraki, Stefan Bechtold, Adrian Perrig:
Transparency Instead of Neutrality. HotNets 2015: 22:1-22:7 - [c24]Iris Safaka, László Czap, Katerina J. Argyraki, Christina Fragouli:
Towards unconditional tor-like anonymity. NetCod 2015: 66-70 - [c23]Aurojit Panda, Katerina J. Argyraki, Mooly Sagiv, Michael Schapira, Scott Shenker:
New Directions for Network Verification. SNAPL 2015: 209-220 - [e1]Jaudelice de Oliveira, Jonathan Smith, Katerina J. Argyraki, Philip Alexander Levis:
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16 - 17, 2015. ACM 2015, ISBN 978-1-4503-4047-2 [contents] - 2014
- [c22]Mihai Dobrescu, Katerina J. Argyraki:
Software Dataplane Verification. NSDI 2014: 101-114 - [c21]Zhiyong Zhang, Ovidiu Mara, Katerina J. Argyraki:
Network neutrality inference. SIGCOMM 2014: 63-74 - [i8]Aurojit Panda, Ori Lahav, Katerina J. Argyraki, Mooly Sagiv, Scott Shenker:
Verifying Isolation Properties in the Presence of Middleboxes. CoRR abs/1409.7687 (2014) - 2013
- [j7]Denisa Ghita, Katerina J. Argyraki, Patrick Thiran:
Toward accurate and practical network tomography. ACM SIGOPS Oper. Syst. Rev. 47(1): 22-26 (2013) - [j6]Lorenzo Keller, Emre Atsan, Katerina J. Argyraki, Christina Fragouli:
SenseCode: Network coding for reliable sensor networks. ACM Trans. Sens. Networks 9(2): 25:1-25:20 (2013) - [c20]Mihai Dobrescu, Katerina J. Argyraki:
Toward a verifiable software dataplane. HotNets 2013: 18:1-18:7 - [c19]Iris Safaka, Christina Fragouli, Katerina J. Argyraki, Suhas N. Diggavi:
Exchanging pairwise secrets efficiently. INFOCOM 2013: 2265-2273 - [c18]Katerina J. Argyraki, Suhas N. Diggavi, Melissa Duarte, Christina Fragouli, Marios Gatzianas, Panagiotis Kostopoulos:
Creating secrets out of erasures. MobiCom 2013: 429-440 - 2012
- [j5]Fabio Soldo, Katerina J. Argyraki, Athina Markopoulou:
Optimal Source-Based Filtering of Malicious Traffic. IEEE/ACM Trans. Netw. 20(2): 381-395 (2012) - [c17]Iris Safaka, Christina Fragouli, Katerina J. Argyraki, Suhas N. Diggavi:
Creating shared secrets out of thin air. HotNets 2012: 73-78 - [c16]Mihai Dobrescu, Katerina J. Argyraki, Sylvia Ratnasamy:
Toward Predictable Performance in Software Packet-Processing Platforms. NSDI 2012: 141-154 - 2011
- [j4]Kevin R. Fall, Gianluca Iannaccone, Maziar Manesh, Sylvia Ratnasamy, Katerina J. Argyraki, Mihai Dobrescu, Norbert Egi:
RouteBricks: enabling general purpose network infrastructure. ACM SIGOPS Oper. Syst. Rev. 45(1): 112-125 (2011) - [c15]Denisa Ghita, Can Karakus, Katerina J. Argyraki, Patrick Thiran:
Shifting network tomography toward a practical goal. CoNEXT 2011: 24 - [c14]Lorenzo Keller, Abdulkadir Karaagaç, Christina Fragouli, Katerina J. Argyraki:
Evaluation of network coding techniques for a sniper detection application. WiOpt 2011: 327-333 - [i7]Mahdi Jafari Siavoshani, U. Pulleti, Emre Atsan, Iris Safaka, Christina Fragouli, Katerina J. Argyraki, Suhas N. Diggavi:
Exchanging Secrets without Using Cryptography. CoRR abs/1105.4991 (2011) - 2010
- [j3]Lorenzo Keller, Mahdi Jafari Siavoshani, Christina Fragouli, Katerina J. Argyraki, Suhas N. Diggavi:
Joint identity-message coding. IEEE J. Sel. Areas Commun. 28(7): 1083-1093 (2010) - [c13]Katerina J. Argyraki, Petros Maniatis, Ankit Singla:
Verifiable network-performance measurements. CoNEXT 2010: 1 - [c12]Mihai Dobrescu, Katerina J. Argyraki, Gianluca Iannaccone, Maziar Manesh, Sylvia Ratnasamy:
Controlling parallelism in a multicore software router. PRESTO@CoNEXT 2010: 2:1-2:6 - [c11]Maziar Manesh, Katerina J. Argyraki, Mihai Dobrescu, Norbert Egi, Kevin R. Fall, Gianluca Iannaccone, Eddie Kohler, Sylvia Ratnasamy:
Evaluating the suitability of server network cards for software routers. PRESTO@CoNEXT 2010: 7:1-7:6 - [c10]Denisa Ghita, Katerina J. Argyraki, Patrick Thiran:
Network tomography on correlated links. Internet Measurement Conference 2010: 225-238 - [c9]Denisa Ghita, Hung Xuan Nguyen, Maciej Kurant, Katerina J. Argyraki, Patrick Thiran:
Netscope: Practical Network Loss Tomography. INFOCOM 2010: 1262-1270 - [i6]Katerina J. Argyraki, Petros Maniatis, Ankit Singla:
Verifiable Network-Performance Measurements. CoRR abs/1005.3148 (2010) - [i5]Fabio Soldo, Katerina J. Argyraki, Athina Markopoulou:
Optimal Source-Based Filtering of Malicious Traffic. CoRR abs/1006.1165 (2010)
2000 – 2009
- 2009
- [j2]Katerina J. Argyraki, David R. Cheriton:
Scalable network-layer defense against internet bandwidth-flooding attacks. IEEE/ACM Trans. Netw. 17(4): 1284-1297 (2009) - [c8]Lorenzo Keller, Mahdi Jafari Siavoshani, Christina Fragouli, Katerina J. Argyraki, Suhas N. Diggavi:
Identity Aware Sensor Networks. INFOCOM 2009: 2177-2185 - [c7]Fabio Soldo, Athina Markopoulou, Katerina J. Argyraki:
Optimal Filtering of Source Address Prefixes: Models and Algorithms. INFOCOM 2009: 2446-2454 - [c6]Mahdi Jafari Siavoshani, Lorenzo Keller, Christina Fragouli, Katerina J. Argyraki:
Compressed network coding vectors. ISIT 2009: 109-113 - [c5]Mihai Dobrescu, Norbert Egi, Katerina J. Argyraki, Byung-Gon Chun, Kevin R. Fall, Gianluca Iannaccone, Allan Knies, Maziar Manesh, Sylvia Ratnasamy:
RouteBricks: exploiting parallelism to scale software routers. SOSP 2009: 15-28 - 2008
- [c4]Katerina J. Argyraki, Salman Baset, Byung-Gon Chun, Kevin R. Fall, Gianluca Iannaccone, Allan Knies, Eddie Kohler, Maziar Manesh, Sergiu Nedevschi, Sylvia Ratnasamy:
Can software routers scale? PRESTO 2008: 21-26 - [i4]Fabio Soldo, Athina Markopoulou, Katerina J. Argyraki:
Optimal Filtering of Malicious IP Sources. CoRR abs/0811.3828 (2008) - 2007
- [c3]Katerina J. Argyraki, Petros Maniatis, Olga Irzak, Subramanian Ashish, Scott Shenker:
Loss and Delay Accountability for the Internet. ICNP 2007: 194-205 - 2006
- [i3]Karim M. El Defrawy, Athina Markopoulou, Katerina J. Argyraki:
Optimal Filtering for DDoS Attacks. CoRR abs/cs/0612066 (2006) - 2005
- [c2]Katerina J. Argyraki, David R. Cheriton:
Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks. USENIX ATC, General Track 2005: 135-148 - 2004
- [c1]Katerina J. Argyraki, David R. Cheriton:
Loose source routing as a mechanism for traffic policies. FDNA@SIGCOMM 2004: 57-64 - [i2]Katerina J. Argyraki, David R. Cheriton:
Protecting Public-Access Sites Against Distributed Denial-of-Service Attacks. CoRR cs.NI/0403042 (2004) - 2003
- [i1]Katerina J. Argyraki, David R. Cheriton:
Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks. CoRR cs.NI/0309054 (2003) - 2001
- [j1]Dimitrios Tzovaras, Nikolaos V. Boulgouris, Katerina J. Argyraki, Michael G. Strintzis:
Rate - distortion optimal fast thresholding for MPEG - 2 image sequence coding. Eur. Trans. Telecommun. 12(3): 189-195 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-27 16:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint