Author of the publication

PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage.

, , , , , , and . CoRR, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated Loop Optimizations for Data Locality Enhancement of Tensor Contraction Expressions., , , and . SC, page 13. IEEE Computer Society, (2005)Cache Miss Characterization and Data Locality Optimization for Imperfectly Nested Loops on Shared Memory Multiprocessors., , , and . IPDPS, IEEE Computer Society, (2005)Performance modeling and optimization of parallel out-of-core tensor contractions., , , , , , and . PPoPP, page 266-276. ACM, (2005)Data Centric Transformations on Non-Integer Iteration Spaces., and . IEEE PACT, page 133-142. IEEE Computer Society, (2005)A novel invariants-based approach for automated software fault localization. University of Illinois Urbana-Champaign, USA, (2012)Using likely program invariants to detect hardware errors., , , , , and . DSN, page 70-79. IEEE Computer Society, (2008)XQuery Perspective: Using XML/XQuery for Scientific Applications and Applying Scientific Compilation Techniques., , and . XIME-P, page 25-30. (2004)Efficient Search-Space Pruning for Integrated Fusion and Tiling Transformations., , , , , , and . LCPC, volume 4339 of Lecture Notes in Computer Science, page 215-229. Springer, (2005)Understanding the propagation of hard errors to software and implications for resilient system design., , , , , and . ASPLOS, page 265-276. ACM, (2008)Supporting XML Based High-Level Abstractions on HDF5 Datasets: A Case Study in Automatic Data Virtualization., and . LCPC, volume 3602 of Lecture Notes in Computer Science, page 299-318. Springer, (2004)