Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OverQoS: offering Internet QoS using overlays., , , and . Computer Communication Review, 33 (1): 11-16 (2003)The VACCINE Framework for Building DLP Systems., , , , , and . CoRR, (2017)Secure Mobile Identities., , , and . CoRR, (2016)Technical Report: Design, Implementation and Deployment of Intermittency-aware Cellular Edge Services for Rural areas., , , , and . CoRR, (2016)The Case for MUSIC: A Programmable IoT Framework for Mobile Urban Sensing Applications., , , , and . CoRR, (2018)Packet Loss Characterization in WiFi-Based Long Distance Networks., , , , , and . INFOCOM, page 312-320. IEEE, (2007)TrickleDNS: Bootstrapping DNS security using social trust., , , and . COMSNETS, page 1-10. IEEE, (2012)Signet: low-cost auditable transactions using SIMs and mobile phones., and . Operating Systems Review, 43 (4): 73-78 (2009)Extraction of (Key, Value) Pairs from Unstructured Ads., , and . AAAI Fall Symposia, AAAI Press, (2014)A Model-Based Embedding Technique for Segmenting Customers., , and . Operations Research, 66 (5): 1247-1267 (2018)