Author of the publication

Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security Perimeters.

, , , and . DSN, page 526-537. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Link Gradients: Predicting the Impact of Network Latency on Multitier Applications., , , , and . INFOCOM, page 2258-2266. IEEE, (2009)The Case for Energy-Oriented Partial Desktop Migration., , , , , and . HotCloud, USENIX Association, (2010)TANGO: Toward a More Reliable Mobile Streaming through Cooperation between Cellular Network and Mobile Devices., , , , , , and . SRDS, page 297-306. IEEE Computer Society, (2016)Performance and availability aware regeneration for cloud based multitier applications., , , , and . DSN, page 497-506. IEEE Computer Society, (2010)Ostro: Scalable Placement Optimization of Complex Application Topologies in Large-Scale Data Centers., , , , and . ICDCS, page 143-152. IEEE Computer Society, (2015)Mistral: Dynamically Managing Power, Performance, and Adaptation Cost in Cloud Infrastructures., , , , and . ICDCS, page 62-73. IEEE Computer Society, (2010)Online model-based adaptation for optimizing performance and dependability., , , , and . WOSS, page 85-89. ACM, (2004)PSCloud: a durable context-aware personal storage cloud., , , , and . HotDep, page 9:1-9:6. ACM, (2013)Jettison: efficient idle desktop consolidation with partial VM migration., , , , , and . EuroSys, page 211-224. ACM, (2012)FloGuard: Cost-Aware Systemwide Intrusion Defense via Online Forensics and On-Demand IDS Deployment., , and . SAFECOMP, volume 6894 of Lecture Notes in Computer Science, page 338-354. Springer, (2011)