Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Single-Threaded Model in Multi-Core In-Memory Systems., , , , , , and . IEEE Trans. Knowl. Data Eng., 28 (10): 2635-2650 (2016)Qanaat: A Scalable Multi-Enterprise Permissioned Blockchain System with Confidentiality Guarantees., , , and . CoRR, (2021)Errata for \., , , , , and . Proc. VLDB Endow., 17 (4): 643 (December 2023)Big Data in Online Social Networks: User Interaction Analysis to Model User Behavior in Social Networks., , , , and . DNIS, volume 8381 of Lecture Notes in Computer Science, page 1-16. Springer, (2014)Secure Data Management in the Cloud., , and . DNIS, volume 7108 of Lecture Notes in Computer Science, page 1-15. Springer, (2011)Data Management Challenges in Cloud Computing Infrastructures., , , and . DNIS, volume 5999 of Lecture Notes in Computer Science, page 1-10. Springer, (2010)Samya: A Geo-Distributed Data System for High Contention Aggregate Data., , , and . ICDE, page 1440-1451. IEEE, (2021)Separ: Towards Regulating Future of Work Multi-Platform Crowdworking Environments with Privacy Guarantees., , , , and . WWW, page 1891-1903. ACM / IW3C2, (2021)DHT overlay schemes for scalable p-range resource discovery., , , , and . HPDC, page 297-298. IEEE Computer Society, (2005)Letter from the Special Issue Editor., and . IEEE Data Eng. Bull., 21 (4): 2 (1998)