Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Malvertising Through Ad-Injecting Browser Extensions., , , , , , and . WWW, page 1286-1295. ACM, (2015)Privacy tradeoffs in predictive analytics., , , , , and . SIGMETRICS, page 57-69. ACM, (2014)Building recommendation systems using peer-to-peer shared content., , and . CIKM, page 1457-1460. ACM, (2010)On the Dynamics of IP Address Allocation and Availability of End-Hosts, , , , , and . CoRR, (2010)Inferring the periodicity in large-scale Internet measurements., , and . INFOCOM, page 1672-1680. IEEE, (2013)Quantifying the Importance of Vantage Points Distribution in Internet Topology Measurements., and . INFOCOM, page 792-800. IEEE, (2009)Privacy-preserving matrix factorization., , , , , and . CCS, page 801-812. ACM, (2013)Song Clustering Using Peer-to-Peer Co-occurrences., and . ISM, page 471-476. IEEE Computer Society, (2009)CARE: content aware redundancy elimination for challenged networks., , , , , , and . HotNets, page 127-132. ACM, (2012)On the Applicability of Peer-to-peer Data in Music Information Retrieval Research., , , and . ISMIR, page 273-278. International Society for Music Information Retrieval, (2010)