Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Case for Enforcing App-Specific Constraints to Mobile Devices by Using Trust Leases., , , and . HotOS, USENIX Association, (2015)An Authentication Protocol for Mobilde Devices., , , and . ICDCS Workshop on Internet, page A13-A17. (2000)The Importance of Ties in the Efficiency of Convention Emergence., , , and . ICAART (2), page 321-329. SciTePress, (2011)Trans-Social Networks for Distributed Processing., , and . Networking (1), volume 7289 of Lecture Notes in Computer Science, page 82-96. Springer, (2012)Sampling Superquadric Point Clouds with Normals.. CoRR, (2018)Efficient Locally Trackable Deduplication in Replicated Systems., and . Middleware, volume 5896 of Lecture Notes in Computer Science, page 103-122. Springer, (2009)Enforcing Obligation with Security Monitors., , and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 172-176. Springer, (2001)ReConMUC: adaptable consistency requirements for efficient large-scale multi-user chat., and . CSCW, page 553-562. ACM, (2011)Context-aware efficient message propagation., and . ARM, page 1. ACM, (2012)PoliPer: policies for mobile and pervasive environments., and . Adaptive and Reflective Middleware, page 238-243. ACM, (2004)