Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Runtime Application Behavior Prediction Using a Statistical Metric Model., , and . IEEE Trans. Computers, 62 (3): 575-588 (2013)Security Analysis of Container Images Using Cloud Analytics Framework., , , , and . ICWS, volume 10966 of Lecture Notes in Computer Science, page 116-133. Springer, (2018)The less server architecture for cloud functions., , and . WOSC@Middleware, page 22-27. ACM, (2017)Opvis: extensible, cross-platform operational visibility and analytics for cloud., , , , and . Middleware Industry, page 43-49. ACM, (2017)Praxi: Cloud Software Discovery That Learns From Practice., , , , , , , and . IEEE Trans. Cloud Comput., 10 (2): 872-884 (2022)Improving server utilization using fast virtual machine migration., , , , and . IBM J. Res. Dev., 55 (6): 4 (2011)Agile, efficient virtualization power management with low-latency server power states., , , , , , , , , and 3 other author(s). ISCA, page 96-107. ACM, (2013)Understanding Security Implications of Using Containers in the Cloud., , , , , and . USENIX Annual Technical Conference, page 313-319. USENIX Association, (2017)DéjàVu: Bringing Black-box Security Analytics to Cloud., , and . Middleware Industry, page 17-24. ACM, (2018)Towards Non-Intrusive Software Introspection and Beyond., , , , , , , , , and . IC2E, page 173-184. IEEE, (2020)