Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Should we build Gnutella on a structured overlay?, , and . Comput. Commun. Rev., 34 (1): 131-136 (2004)Online data mining services for dynamic spatial databases II: air quality location based services and sonification, , , , , , , , , and . II International Conference and Exhibition on Geographic Information, (2005)Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement., , , , and . CoRR, (2022)Toward confidential cloud computing., , , , , , , and . Commun. ACM, 64 (6): 54-61 (2021)Vigilante: end-to-end containment of internet worms., , , , , , and . SOSP, page 133-147. ACM, (2005)3D environments as social learning tools: the VIRTU@LIS experience., , , , , , , , and . SIGGRAPH Educators Program, page 1. ACM, (2005)Better bug reporting with better privacy., , and . ASPLOS, page 319-328. ACM, (2008)Observing and Preventing Leakage in MapReduce., , , , , and . CCS, page 1570-1581. ACM, (2015)Broom: Sweeping Out Garbage Collection from Big Data Systems., , , , , , , , , and . HotOS, USENIX Association, (2015)Bouncer: securing software by blocking bad input., , , , and . SOSP, page 117-130. ACM, (2007)