Author of the publication

Non-intrusive, out-of-band and out-of-the-box systems monitoring in the cloud.

, , , , and . SIGMETRICS, page 249-261. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GSM indoor localization., , , , and . Pervasive Mob. Comput., 3 (6): 698-720 (2007)Proximity-based authentication of mobile devices., , , and . Int. J. Secur. Networks, 4 (1/2): 4-16 (2009)Scanning the literature.. ACM SIGMOBILE Mob. Comput. Commun. Rev., 8 (2): 1-2 (2004)Exploiting Social Interactions in Mobile Systems., , , , , and . UbiComp, volume 4717 of Lecture Notes in Computer Science, page 409-428. Springer, (2007)An Exploration of Location Error Estimation., , , and . UbiComp, volume 4717 of Lecture Notes in Computer Science, page 181-198. Springer, (2007)Amigo: Proximity-Based Authentication of Mobile Devices., , , and . UbiComp, volume 4717 of Lecture Notes in Computer Science, page 253-270. Springer, (2007)Octopus: efficient data intensive computing on virtualized datacenters., , , , and . SYSTOR, page 3:1-3:11. ACM, (2013)A preliminary investigation of worm infections in a bluetooth environment., , , , , , , and . WORM, page 9-16. ACM Press, (2006)Low-bandwidth VM migration via opportunistic replay., , , and . HotMobile, page 74-79. ACM, (2008)SnowFlock: rapid virtual machine cloning for cloud computing., , , , , , , and . EuroSys, page 1-12. ACM, (2009)