Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Paper rating vs. paper ranking.. ACM SIGOPS Oper. Syst. Rev., 43 (2): 117-121 (2009)Paper Rating vs. Paper Ranking.. WOWCS, USENIX Association, (2008)Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs., , , and . SIGMETRICS, page 34-43. ACM, (2000)Optimizing File Availability in a Secure Serverless Distributed File System., and . SRDS, page 4-13. IEEE Computer Society, (2001)The Sybil Attack.. IPTPS, volume 2429 of Lecture Notes in Computer Science, page 251-260. Springer, (2002)Leveraging Legacy Code to Deploy Desktop Applications on the Web., , , and . OSDI, page 339-354. USENIX Association, (2008)Is remote host availability governed by a universal law?. SIGMETRICS Perform. Evaluation Rev., 31 (3): 25-29 (2003)MapCruncher: integrating the world's geographic information., , and . ACM SIGOPS Oper. Syst. Rev., 41 (2): 50-59 (2007)How to Run POSIX Apps in a Minimal Picoprocess., , and . USENIX Annual Technical Conference, page 321-332. USENIX Association, (2013)Memoir: Practical State Continuity for Protected Modules., , , , and . IEEE Symposium on Security and Privacy, page 379-394. IEEE Computer Society, (2011)