Author of the publication

Proper: Privileged Operations in a Virtualised System Environment.

, , , , and . USENIX Annual Technical Conference, General Track, page 367-370. USENIX, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fast Multi-Server, Multi-Block Private Information Retrieval Protocol., , , and . GLOBECOM, page 1-6. IEEE, (2015)Detecting latent cross-platform API violations., , , , , and . ISSRE, page 484-495. IEEE Computer Society, (2015)Finding Sensitive Accounts on Twitter: An Automated Approach Based on Follower Anonymity., , and . ICWSM, page 655-658. AAAI Press, (2016)Collaboration with DiamondTouch., , , , , and . INTERACT, volume 3585 of Lecture Notes in Computer Science, page 986-989. Springer, (2005)It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots., , , , , and . ACSAC, page 296-305. ACM, (2014)Selectively Taming Background Android Apps to Improve Battery Lifetime., , and . USENIX Annual Technical Conference, page 563-575. USENIX Association, (2015)Net-X: Unified Data-Centric Internet Services., , , , and . NetDB, USENIX Association, (2007)San Fermín: Aggregating Large Data Sets Using a Binomial Swap Forest., and . NSDI, page 147-160. USENIX Association, (2008)Model-based Testing Without a Model: Assessing Portability in the Seattle Testbed., and . SSV, USENIX Association, (2010)Dependable Self-Hosting Distributed Systems Using Constraints., , , and . HotDep, USENIX Association, (2008)