Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Data Deletion for Linux File Systems., and . USENIX Security Symposium, USENIX, (2001)PowerBoost., , and . HomeNets@SIGCOMM, page 7-12. ACM, (2011)Evaluating Stream Filtering for Entity Profile Updates for TREC 2013., , , , , , , , and . TREC, volume 500-302 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2013)Learning User Preferences for Wireless Services Provisioning., , , and . AAMAS, page 480-487. IEEE Computer Society, (2004)Network Neutrality: monitoring tools, economic analysis, and Internet architecture.. Massachusetts Institute of Technology, Cambridge, MA, USA, (2008)ndltd.org (oai:dspace.mit.edu:1721.1/44406).A User-Guided Cognitive Agent for Network Service Selection in Pervasive Computing Environments., , , and . PerCom, page 219-228. IEEE Computer Society, (2004)Simple and General Statistical Profiling with PCT., and . USENIX ATC, General Track, page 205-217. USENIX, (2002)