[1] Daniel S. Berger, Martin Karsten, and Jens Schmitt. Simulation of adversarial scenarios in omnet++: Putting adversarial queueing theory from its head to feet. In Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, SimuTools '13, pages 291--298, ICST, Brussels, Belgium, Belgium, 2013. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering). [ bib | .pdf ]
[2] Daniel S. Berger and Florin Ciucu. A bound on the moments of a ttl-based cache's miss-process. In Proceedings of the 7th GI/ITG-Workshop MMBnet, pages 56--62, September 2013. [ bib | .pdf ]
[3] Daniel S. Berger and Florin Ciucu. Stochastic bounds on inter-miss times from TTL caches. Praxis der Informationsverarbeitung und Kommunikation, 37:109--120, 2014. [ bib | DOI | http ]
[4] Daniel S. Berger, Martin Karsten, and Jens Schmitt. On the relevance of adversarial queueing theory in practice. In The 2014 ACM International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '14, pages 343--354, New York, NY, USA, 2014. ACM. [ bib | DOI | .pdf ]
[5] Daniel S. Berger, Philipp Gland, Sahil Singla, and Florin Ciucu. Exact analysis of ttl cache networks: The case of caching policies driven by stopping times. In The 2014 ACM International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '14, pages 595--596, New York, NY, USA, 2014. ACM. [ bib | DOI | .pdf ]
[6] Daniel S. Berger, Francesco Gringoli, Nicol`o Facchi, Ivan Martinovic, and Jens Schmitt. Gaining insight on friendly jamming in a real-world ieee 802.11 network. In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec '14, pages 105--116, New York, NY, USA, 2014. ACM. [ bib | DOI | .pdf ]
[7] Daniel S. Berger, Philipp Gland, Sahil Singla, and Florin Ciucu. Exact analysis of TTL cache networks. Performance Evaluation, 79(0):2--23, 2014. Special Issue: Performance 2014. [ bib | DOI | .pdf ]
[8] Matthias Schäfer, Daniel S. Berger, Vincent Lenders, and Jens Schmitt. Security by mobility in location and track verification. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '15, pages 29:1--29:2, New York, NY, USA, 2015. ACM. [ bib | DOI | http ]
[9] Daniel S. Berger, Sebastian Henningsen, Florin Ciucu, and Jens B. Schmitt. Maximizing cache hit ratios by variance reduction. SIGMETRICS Perform. Eval. Rev., 43(2):57--59, September 2015. [ bib | DOI | http ]
[10] Daniel S Berger, Martin Karsten, and Jens Schmitt. How real is the threat of instability events predicted by adversarial queueing theory? Tiny Transactions on Computer Science, January 2016. [ bib ]
[11] D. S. Berger, F. Gringoli, N. Facchi, I. Martinovic, and J. B. Schmitt. Friendly jamming on access points: Analysis and real-world measurements. IEEE Transactions on Wireless Communications, PP(99), June 2016. [ bib | .pdf ]
[12] T. Zhu, D. S. Berger, and M. Harchol-Balter. Snc-meister: Admitting more tenants with tail latency slos. In ACM SoCC (Symposium on Cloud Computing), September 2016. [ bib | .pdf ]
[13] M. Karsten, D. S. Berger, and J. Schmitt. Traffic-driven implicit buffer management - delay differentiation without traffic contracts. In Proceedings of the 28th International Teletraffic Congress (ITC 28), September 2016. [ bib | .pdf ]
[14] Daniel S Berger, Ramesh Sitaraman, and Mor Harchol-Balter. Adaptsize: Orchestrating the hot object memory cache in a cdn. In USENIX NSDI, March 2017. [ bib | .pdf ]