Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bhola, Sumeer
add a person with the name Bhola, Sumeer
 

Other publications of authors with the same name

xBook: Redesigning Privacy Control in Social Networking Platforms., , and . USENIX Security Symposium, page 249-266. USENIX Association, (2009)Utility-aware Resource Allocation in an Event Processing System., , , and . ICAC, page 55-64. IEEE Computer Society, (2006)Pulsar: A resource-control architecture for time-critical service-oriented applications., , , , , and . IBM Systems Journal, 47 (2): 265-280 (2008)Efficient Implementation of Java Remote Method Invocation (RMI)., , , , , , and . COOTS, page 19-27. USENIX, (1998)Congestion Control in a Reliable Scalable Message-Oriented Middleware., and . Middleware, volume 2672 of Lecture Notes in Computer Science, page 202-221. Springer, (2003)1/k phase stamping for continuous shared data (extended abstract)., and . PODC, page 181-190. ACM, (2000)Subscription Propagation and Content-Based Routing with Delivery Guarantees., , and . DISC, volume 3724 of Lecture Notes in Computer Science, page 501-502. Springer, (2005)Responsiveness and Consistency Tradoffs in Interactive Groupware., , and . PODC, page 324. ACM, (1998)SMash: secure component model for cross-domain mashups on unmodified browsers., , , , and . WWW, page 535-544. ACM, (2008)Utility Optimization for Event-Driven Distributed Infrastructures., , and . ICDCS, page 24. IEEE Computer Society, (2006)