Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated Network Experimentation using Simulation and Emulation., , and . TRIDENTCOM, page 204-212. IEEE Computer Society, (2005)Large-scale Virtualization in the Emulab Network Testbed., , , , , , , and . USENIX Annual Technical Conference, page 113-128. USENIX Association, (2008)Trusted Disk Loading in the Emulab Network Testbed., , , and . CSET, USENIX Association, (2010)OpenEdge: A dynamic and secure open service edge network., , , , , and . NOMS, page 257-264. IEEE, (2016)Apt: A Platform for Repeatable Research in Computer Science., , , , , , and . Operating Systems Review, 49 (1): 100-107 (2015)Fluorescence: Detecting Kernel-Resident Malware in Clouds., , , , , and . RAID, page 367-382. USENIX Association, (2019)Harpocrates: Giving Out Your Secrets and Keeping Them Too., , , and . SEC, page 103-114. IEEE, (2018)I Heard It through the Firewall: Exploiting Cloud Management Services as an Information Leakage Channel., , , and . SoCC, page 361-373. ACM, (2018)GPUstore: harnessing GPU computing for storage systems in the OS kernel., , and . SYSTOR, page 6. ACM, (2012)PopperCI: Automated reproducibility validation., , , , , , and . INFOCOM Workshops, page 450-455. IEEE, (2017)