Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Maniatis, Petros
add a person with the name Maniatis, Petros
 

Other publications of authors with the same name

Mantis: Automatic Performance Prediction for Smartphone Applications., , , , , , , , , and . USENIX Annual Technical Conference, page 297-308. USENIX Association, (2013)BFT Protocols Under Fire., , , , and . NSDI, page 189-204. USENIX Association, (2008)Induced Churn as Shelter from Routing-Table Poisoning., , , , and . NDSS, The Internet Society, (2006)A Historic Name-Trail Service., and . WMCSA, page 88-99. IEEE Computer Society, (2003)Symbolic software model validation., , , , , , , , and . MEMOCODE, page 97-108. IEEE, (2013)CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution, , , and . CoRR, (2010)Tiered Fault Tolerance for Long-Term Integrity., , , and . FAST, page 267-282. USENIX, (2009)The mobile people architecture., , , , , , and . Mobile Computing and Communications Review, 3 (3): 36-42 (1999)Attested append-only memory: making adversaries stick to their word., , , and . SOSP, page 189-204. ACM, (2007)Using queries for distributed monitoring and forensics., , , and . EuroSys, page 389-402. ACM, (2006)