Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing data locality in distributed systems., , , , and . J. Comput. Syst. Sci., 72 (8): 1309-1316 (2006)Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd., , , and . INFOCOM, page 1179-1187. IEEE, (2011)The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff., , , , and . LEET, USENIX Association, (2008)Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying., , , , and . USENIX Annual Technical Conference, General Track, page 87-98. USENIX, (2004)Measuring Online Service Availability Using Twitter., , , , and . WOSN, USENIX Association, (2010)On Object Maintenance in Peer-to-Peer Systems., and . IPTPS, (2006)Dirty Jobs: The Role of Freelance Labor in Web Service Abuse., , , , and . USENIX Security Symposium, USENIX Association, (2011)Dual Frame Motion Compensation with Uneven Quality Assignment., , and . Data Compression Conference, page 262-271. IEEE Computer Society, (2004)Managing Contention with Medley., , and . IEEE Trans. Mob. Comput., 14 (3): 579-591 (2015)Hot-spot congestion relief and service guarantees in public-area wireless networks., , and . Computer Communication Review, 32 (1): 59 (2002)