Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demo: Kahawai: high-quality mobile gaming using GPU offload., , , , , and . MobiSys, page 345. ACM, (2014)Permissions Plugins as Android Apps., , , , and . MobiSys, page 180-192. ACM, (2019)Better Performance Through Thread-local Emulation., , , and . HotMobile, page 87-92. ACM, (2016)Peer NAT proxies for peer-to-peer games., , , , and . NETGAMES, page 1-6. IEEE, (2009)SpanDex: Secure Password Tracking for Android., , , , , , and . USENIX Security Symposium, page 481-494. USENIX Association, (2014)Demo: What You Mark is What Apps See., , , , , and . MobiSys (Companion Volume), page 116. ACM, (2016)SandTrap: Tracking Information Flows On Demand with Parallel Permissions., , , , , and . MobiSys, page 230-242. ACM, (2018)What You Mark is What Apps See., , , , , and . MobiSys, page 249-261. ACM, (2016)Demo: Zero interaction private messaging with ZIPR., and . MobiSys, page 351-352. ACM, (2014)Dynamic regulation of mobile 3G/HSPA uplink buffer with Receiver-side Flow Control., , , and . ICNP, page 1-10. IEEE Computer Society, (2012)