Author of the publication

Performance Inconsistency in Large Scale Data Processing Clusters.

, , , , and . ICAC, page 297-302. USENIX Association, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Givs: Fine-Grained Gesture Control for Mobile Devices in Driving Environments., , , and . IEEE Access, (2020)Millimeter Wave Communication: A Comprehensive Survey., , , , , , and . IEEE Commun. Surv. Tutorials, 20 (3): 1616-1653 (2018)Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network., , , and . ESORICS (1), volume 11735 of Lecture Notes in Computer Science, page 234-256. Springer, (2019)Data loss and reconstruction in sensor networks., , , , and . INFOCOM, page 1654-1662. IEEE, (2013)A Generic Construction of Puncturable Encryption., and . CyberC, page 120-124. IEEE, (2019)Efficient and deterministic replay for web-enabled Android apps., , , and . ICSE (Companion Volume), page 329-330. ACM, (2018)Reproducible Interference-Aware Mobile Testing., , , , and . ICSME, page 36-47. IEEE Computer Society, (2018)Why application errors drain battery easily?: a study of memory leaks in smartphone apps., , , and . HotPower@SOSP, page 2:1-2:5. ACM, (2013)AdSherlock: Efficient and Deployable Click Fraud Detection for Mobile Applications., , , , , , and . IEEE Trans. Mob. Comput., 20 (4): 1285-1297 (2021)EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service., , , , and . IEEE Trans. Emerg. Top. Comput., 3 (3): 372-383 (2015)