Author of the publication

Virtualization-Based Techniques for Enabling Multi-tenant Management Tools.

, , , , and . DSOM, volume 4785 of Lecture Notes in Computer Science, page 171-182. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring enterprise network usage pattern & deploying passive optical LANs., , , , , , and . IM, page 890-893. IEEE, (2015)Lightweight searchable screen video recording., , and . VCIP, page 1-6. IEEE, (2012)Integrated user activity monitoring for regulatory services., , , , , , , and . NOMS, page 750-763. IEEE, (2012)The origins of network server latency & the myth of connection scheduling., and . SIGMETRICS, page 424-425. ACM, (2004)How DNS Misnaming Distorts Internet Topology Mapping., , , and . USENIX Annual Technical Conference, General Track, page 369-374. USENIX, (2006)Understanding and Addressing Blocking-Induced Network Server Latency., and . USENIX Annual Technical Conference, General Track, page 143-156. USENIX, (2006)Building end-to-end management analytics for enterprise data centers., , , , , and . Integrated Network Management, page 661-675. IEEE, (2009)Are clouds ready for large distributed applications?, , , , and . ACM SIGOPS Oper. Syst. Rev., 44 (2): 18-23 (2010)Sedic: privacy-aware data intensive computing on hybrid clouds., , , , and . ACM Conference on Computer and Communications Security, page 515-526. ACM, (2011)Splitter: a proxy-based approach for post-migration testing of web applications., , , , , and . EuroSys, page 97-110. ACM, (2010)