From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A distributed approach to taming peak demand., , и . IGCC, стр. 1-6. IEEE Computer Society, (2012)Percival: A searchable secret-split datastore., , , , , и . MSST, стр. 1-12. IEEE Computer Society, (2015)Secure Distributed Membership Tests via Secret Sharing: How to Hide Your Hostile Hosts Harnessing Shamir Secret Sharing., , , , , и . CoRR, (2015)RESAR: Reliable Storage at Exabyte Scale., , , , , и . MASCOTS, стр. 211-220. IEEE Computer Society, (2016)Timely Reporting of Heavy Hitters Using External Memory., , , , , , , и . ACM Trans. Database Syst., 46 (4): 14:1-14:35 (2021)Automatic generation of behavioral hard disk drive access time models., , , , и . MSST, стр. 1-11. IEEE Computer Society, (2014)Virtually the Same: Comparing Physical and Virtual Testbeds., , , и . ICNC, стр. 847-853. IEEE, (2019)Tracking Network Events with Write Optimized Data Structures: The Design and Implementation of TWIAD: The Write-Optimized IP Address Database., , , , , и . CoRR, (2015)Tracking Network Events with Write Optimized Data Structures., , , , , и . BADGERS@RAID, стр. 1-7. IEEE, (2015)Secure distributed membership tests via secret sharing: How to hide your hostile hosts: Harnessing shamir secret sharing., , , , , и . ICNC, стр. 1-6. IEEE Computer Society, (2016)