Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Staged simulation: A general technique for improving simulation scale and performance., and . ACM Trans. Model. Comput. Simul., 14 (2): 170-195 (2004)Design and implementation of a single system image operating system for ad hoc networks., , , , and . MobiSys, page 149-162. ACM, (2005)Fighting peer-to-peer SPAM and decoys with object reputation., and . P2PECON@SIGCOMM, page 138-143. ACM, (2005)Intra-Cloud and Inter-Cloud Authentication., and . CLOUD, page 318-325. IEEE Computer Society, (2017)The 30th Anniversary of the Supercomputing Conference: Bringing the Future Closer - Supercomputing History and the Immortality of Now., , and . Computer, 51 (10): 74-85 (2018)Scalability and Accuracy in a Large-Scale Network Emulator., , , , , , and . OSDI, USENIX Association, (2002)Operating Systems Review 36, Special Issue, Winter 2002.A look back on 30 years of the Gordon Bell Prize., , , , and . Int. J. High Perform. Comput. Appl., 31 (6): 469-484 (2017)Authorization and trust in software systems.. Cornell University, USA, (2012)Workshop Report., , , , , , , , , and 2 other author(s). IPTPS, volume 3640 of Lecture Notes in Computer Science, page 1-12. Springer, (2005)Experience with an Object Reputation System for Peer-to-Peer Filesharing., and . NSDI, USENIX, (2006)Awarded Best Paper.