Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Data Preservers for Web Services., , and . WebApps, USENIX Association, (2011)Predicting Execution Time of Computer Programs Using Sparse Polynomial Regression., , , , , and . NIPS, page 883-891. Curran Associates, Inc., (2010)Towards verifiable resource accounting for outsourced computation., , , , and . VEE, page 167-178. ACM, (2013)Loss and Delay Accountability for the Internet., , , , and . ICNP, page 194-205. IEEE Computer Society, (2007)2 P2P or Not 2 P2P?, , , , , and . IPTPS, volume 3279 of Lecture Notes in Computer Science, page 33-43. Springer, (2004)KGym: A Platform and Dataset to Benchmark Large Language Models on Linux Kernel Crash Resolution., , , , , , and . CoRR, (2024)Zeno: Eventually Consistent Byzantine-Fault Tolerance., , , , and . NSDI, page 169-184. USENIX Association, (2009)The Performance Cost of Shadow Stacks and Stack Canaries., , and . AsiaCCS, page 555-566. ACM, (2015)CodeTrek: Flexible Modeling of Code using an Extensible Relational Representation., , , , , and . ICLR, OpenReview.net, (2022)SpreadsheetCoder: Formula Prediction from Semi-structured Context., , , , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 1661-1672. PMLR, (2021)