Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inverted Browser: A Novel Approach towards Display Symbiosis., , , and . PerCom, page 71-76. IEEE Computer Society, (2006)Sender Coordination in the Distributed Virtual Communication Machine., and . HPDC, page 322-329. IEEE Computer Society, (1998)Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation., , , , , , and . IACR Cryptology ePrint Archive, (2014)Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries., , , , , and . CRYPTO (1), volume 8042 of Lecture Notes in Computer Science, page 353-373. Springer, (2013)Early-Stopping Terminating Reliable Broadcast Protocol for General Omission Failures (Abstract).. PODC, page 209. ACM, (1996)An evaluation of TCP splice benefits in web proxy servers., and . WWW, page 13-24. ACM, (2002)A-SOAP: Adaptive SOAP Message Processing and Compression.. ICWS, page 200-207. IEEE Computer Society, (2007)Supporting Parallel Applications on Clusters of Workstations: The Intelligent Network Interface Approach., , and . HPDC, page 159-168. IEEE Computer Society, (1997)On demand platform for online games., , , , and . IBM Systems Journal, 45 (1): 7-20 (2006)Efficient Message Passing Interface (MPI) for Parallel Computing on Clusters of Workstations., , , , and . SPAA, page 64-73. ACM, (1995)