Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A universal method for composing business transaction models using logs., , , and . Integrated Network Management, page 17-24. IEEE, (2009)On the Design and Quantification of Privacy Preserving Data Mining Algorithms., and . PODS, ACM, (2001)A note on information-theoretic secret key exchange over wireless channels., , and . Allerton, page 754-761. IEEE, (2009)Trojan Detection using IC Fingerprinting., , , , and . S&P, page 296-310. IEEE Computer Society, (2007)SparkBench - A Spark Performance Testing Suite., , , , , , , , , and . TPCTC, volume 9508 of Lecture Notes in Computer Science, page 26-44. Springer, (2015)Planning and Managing the IPTV Service Deployment., , , and . Integrated Network Management, page 353-362. IEEE, (2007)Microscopic Social Influence., , , and . SDM, page 129-140. SIAM / Omnipress, (2012)Inferring client response time at the web server., , and . SIGMETRICS, page 160-171. ACM, (2002)Policy Ratification., , , and . POLICY, page 223-232. IEEE Computer Society, (2005)Issues in Designing a Policy Language for Distributed Management of IT Infrastructures., , , and . Integrated Network Management, page 30-39. IEEE, (2007)