Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging Good Intentions to Reduce Malicious Network Traffic.. SRUTI, USENIX Association, (2006)On Improving User Response Times in Tableau., , , , and . SIGMOD Conference, page 1695-1706. ACM, (2015)Rethinking the Design of Virtual Machine Monitors., , , and . Computer, 38 (5): 57-62 (2005)vSPARQL: A view definition language for the semantic web., , , , and . J. Biomed. Informatics, 44 (1): 102-117 (2011)Scale and Performance in the Denali Isolation Kernel., , and . OSDI, USENIX Association, (2002)Operating Systems Review 36, Special Issue, Winter 2002.Denali: a scalable isolation kernel., , and . ACM SIGOPS European Workshop, page 10-15. ACM, (2002)Generating Application Ontologies from Reference Ontologies., , , and . AMIA, AMIA, (2008)Constructing Services with Interposable Virtual Hardware., , , and . NSDI, page 169-182. USENIX, (2004)Optimizing Large-Scale Semi-Naïve Datalog Evaluation in Hadoop., , , and . Datalog, volume 7494 of Lecture Notes in Computer Science, page 165-176. Springer, (2012)A Dataflow Graph Transformation Language and Query Rewriting System for RDF Ontologies., , , and . SSDBM, volume 7338 of Lecture Notes in Computer Science, page 544-561. Springer, (2012)