Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Post, Ansley
add a person with the name Post, Ansley
 

Other publications of authors with the same name

Orchestrating the Deployment of Computations in the Cloud with Conductor., , , and . NSDI, page 367-381. USENIX Association, (2012)Ostra: Leveraging Trust to Thwart Unwanted Communication., , , and . NSDI, page 15-30. USENIX Association, (2008)Limiting large-scale crawls of social networking sites., , , , , , and . SIGCOMM, page 398-399. ACM, (2011)An analysis of social network-based Sybil defenses., , , and . SIGCOMM, page 363-374. ACM, (2010)Fallacies in Evaluating Decentralized Systems., , , and . IPTPS, (2006)FeedTree: Sharing Web Micronews with Peer-to-Peer Event Notification., , , and . IPTPS, volume 3640 of Lecture Notes in Computer Science, page 141-151. Springer, (2005)Canal: scaling social network-based Sybil tolerance schemes., , , , and . EuroSys, page 309-322. ACM, (2012)Guardat: enforcing data policies at the storage layer., , , , , , , and . EuroSys, page 13:1-13:16. ACM, (2015)Autonomous Storage Management for Personal Devices with PodBase., , , and . USENIX Annual Technical Conference, USENIX Association, (2011)Bazaar: Strengthening User Reputations in Online Marketplaces., , and . NSDI, USENIX Association, (2011)