From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers., , , , , , и . WWW, стр. 319-328. ACM, (2018)Scalable information sharing in large scale distributed systems., , , и . ACM SIGOPS European Workshop, стр. 149-156. ACM, (1996)Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall., , и . ISI, том 3495 из Lecture Notes in Computer Science, стр. 492-497. Springer, (2005)A Framework for Countering Denial-of-Information Attacks., и . IEEE Secur. Priv., 3 (6): 50-56 (2005)Parameterized Authentication., , , и . ESORICS, том 3193 из Lecture Notes in Computer Science, стр. 276-292. Springer, (2004)Lifetime Based Consistency Protocols for Distributed Objects., , и . DISC, том 1499 из Lecture Notes in Computer Science, стр. 378-392. Springer, (1998)Workload Modeling for Highly Interactive Applications., и . SIGMETRICS, стр. 210-211. ACM, (1999)Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis., , , , и . NDSS, The Internet Society, (2017)Incentives in BitTorrent induce free riding., и . P2PECON@SIGCOMM, стр. 116-121. ACM, (2005)A Characterization of Scalable Shared Memories., , и . ICPP (1), стр. 332-335. CRC Press, (1993)