From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection., , , , , , и . Proc. VLDB Endow., 8 (12): 1828-1839 (2015)When the network crumbles: an empirical study of cloud network failures and their impact on services., и . SoCC, стр. 15:1-15:17. ACM, (2013)iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks., , и . ACM Conference on Computer and Communications Security, стр. 723-725. ACM, (2010)Private Badges for Geosocial Networks., , , и . IEEE Trans. Mob. Comput., 13 (10): 2382-2396 (2014)The Dark Menace: Characterizing Network-based Attacks in the Cloud., , , и . Internet Measurement Conference, стр. 169-182. ACM, (2015)Automated Adversarial Testing of Unmodified Wireless Routing Implementations., , , , и . IEEE/ACM Trans. Netw., 24 (6): 3369-3382 (2016)Pandora: a platform for worm simulations in mobile ad-hoc networks., и . ACM SIGMOBILE Mob. Comput. Commun. Rev., 14 (4): 16-18 (2010)Move Fast and Meet Deadlines: Fine-grained Real-time Stream Processing with Cameo., , , , и . NSDI, стр. 389-405. USENIX Association, (2021)You unlocked the Mt. Everest badge on foursquare! Countering location fraud in Geosocial Networks., и . MASS, стр. 182-190. IEEE Computer Society, (2012)Helios: Hyperscale Indexing for the Cloud & Edge., , , , , , , , , и 1 other автор(ы). Proc. VLDB Endow., 13 (12): 3231-3244 (2020)