Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Lone Dwarfs to Giant Superclusters: Rethinking Operating System Abstractions for the Cloud., , and . HotOS, USENIX Association, (2015)Query-efficient Partitions for Dynamic Data., , and . APSys, page 23:1-23:8. ACM, (2017)Multiplayer pervasive games and networked interactive installations using ad hoc mobile sensor networks., , , , , , and . Advances in Computer Entertainment Technology, volume 422 of ACM International Conference Proceeding Series, page 453. ACM, (2009)Mir: Automated Quantifiable Privilege Reduction Against Dynamic Library Compromise in JavaScript., , , , , , and . CoRR, (2020)Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing., , , and . ARES, page 10:1-10:11. ACM, (2022)The future of the shell: Unix and beyond., , and . HotOS, page 240-241. ACM, (2021)TMC: Pay-as-you-Go Distributed Communication., , , , , , , , and . APNet, page 15-21. ACM, (2019)A Screen of FDA-Approved Drugs for Inhibitors of Zika Virus Infection, , , , , , , , , and 9 other author(s). Cell Host and Microbe, (2016)A systematic analysis of the event-stream incident., , , and . EuroSec@EUROSYS, page 22-28. ACM, (2022)BinWrap: Hybrid Protection against Native Node.js Add-ons., , , , , and . AsiaCCS, page 429-442. ACM, (2023)