Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dirty Jobs: The Role of Freelance Labor in Web Service Abuse., , , , and . USENIX Security Symposium, USENIX Association, (2011)Dual Frame Motion Compensation with Uneven Quality Assignment., , and . Data Compression Conference, page 262-271. IEEE Computer Society, (2004)Managing Contention with Medley., , and . IEEE Trans. Mob. Comput., 14 (3): 579-591 (2015)Maximizing data locality in distributed systems., , , , and . J. Comput. Syst. Sci., 72 (8): 1309-1316 (2006)Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying., , , , and . USENIX Annual Technical Conference, General Track, page 87-98. USENIX, (2004)Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd., , , and . INFOCOM, page 1179-1187. IEEE, (2011)The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff., , , , and . LEET, USENIX Association, (2008)Measuring Online Service Availability Using Twitter., , , , and . WOSN, USENIX Association, (2010)On Object Maintenance in Peer-to-Peer Systems., and . IPTPS, (2006)Access and mobility of wireless PDA users., and . Mobile Computing and Communications Review, 9 (2): 40-55 (2005)