Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SparkBench - A Spark Performance Testing Suite., , , , , , , , , and . TPCTC, volume 9508 of Lecture Notes in Computer Science, page 26-44. Springer, (2015)A note on information-theoretic secret key exchange over wireless channels., , and . Allerton, page 754-761. IEEE, (2009)Trojan Detection using IC Fingerprinting., , , , and . S&P, page 296-310. IEEE Computer Society, (2007)A universal method for composing business transaction models using logs., , , and . Integrated Network Management, page 17-24. IEEE, (2009)On the Design and Quantification of Privacy Preserving Data Mining Algorithms., and . PODS, ACM, (2001)Planning and Managing the IPTV Service Deployment., , , and . Integrated Network Management, page 353-362. IEEE, (2007)Microscopic Social Influence., , , and . SDM, page 129-140. SIAM / Omnipress, (2012)Inferring client response time at the web server., , and . SIGMETRICS, page 160-171. ACM, (2002)Policy Ratification., , , and . POLICY, page 223-232. IEEE Computer Society, (2005)A BSP approach to composite network analysis., , , and . PerCom Workshops, page 407-412. IEEE Computer Society, (2014)