Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing data locality in distributed systems., , , , and . J. Comput. Syst. Sci., 72 (8): 1309-1316 (2006)Mobisaic: An Information System for a Mobile Wireless Computing Environment., and . Mobidata, volume 353 of The Kluwer International Series in Engineering and Computer Science, page 375-395. Kluwer / Springer, (1994)Report on the SIGMETRICS '98/PERFORMANCE '98 Joint International Conference on Measuerment and Modeling of Computer Systems.. Operating Systems Review, 32 (4): 3-8 (1998)Sora: high-performance software radio using general-purpose multi-core processors., , , , , and . Commun. ACM, 54 (1): 99-107 (2011)Detecting and Characterizing Lateral Phishing at Scale., , , , , , , and . USENIX Security Symposium, page 1273-1290. USENIX Association, (2019)Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd., , , and . INFOCOM, page 1179-1187. IEEE, (2011)Measuring Online Service Availability Using Twitter., , , , and . WOSN, USENIX Association, (2010)On Object Maintenance in Peer-to-Peer Systems., and . IPTPS, (2006)Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying., , , , and . USENIX Annual Technical Conference, General Track, page 87-98. USENIX, (2004)The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff., , , , and . LEET, USENIX Association, (2008)