Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Email Trustworthiness through Social-Group Key Authentication., , and . CEAS, (2008)Active Highways (Position Paper)., , , and . PIMRC, page 1-5. IEEE, (2008)Adaptive Traffic Lights Using Car-to-Car Communication., , , , and . VTC Spring, page 21-25. IEEE, (2007)Lazy Garbage Collection of Recovery State for Fault-Tolerant Distributed Shared Memory., , and . IEEE Trans. Parallel Distributed Syst., 13 (7): 673-686 (2002)Scope Consistency: A Bridge Between Release Consistency and Entry Consistency., , and . SPAA, page 277-287. ACM, (1996)The MobiSoC middleware for mobile social computing: challenges, design, and early experiences., , , , and . MOBILWARE, volume 278 of ACM International Conference Proceeding Series, page 27. (2008)Privately querying location-based services with SybilQuery., , and . UbiComp, page 31-40. ACM, (2009)Software Distributed Shared Memory over Virtual Interface Architecture: Implemenation and Performance., and . Annual Linux Showcase & Conference, USENIX Association, (2000)Short paper: enhancing users' comprehension of android permissions., , , , and . SPSM@CCS, page 21-26. ACM, (2012)Software Support for Virtual Memory-Mapped Communication., , , and . IPPS, page 372-281. IEEE Computer Society, (1996)