From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Leveraging Good Intentions to Reduce Malicious Network Traffic.. SRUTI, USENIX Association, (2006)On Improving User Response Times in Tableau., , , , и . SIGMOD Conference, стр. 1695-1706. ACM, (2015)Rethinking the Design of Virtual Machine Monitors., , , и . Computer, 38 (5): 57-62 (2005)vSPARQL: A view definition language for the semantic web., , , , и . J. Biomed. Informatics, 44 (1): 102-117 (2011)Scale and Performance in the Denali Isolation Kernel., , и . OSDI, USENIX Association, (2002)Operating Systems Review 36, Special Issue, Winter 2002.Denali: a scalable isolation kernel., , и . ACM SIGOPS European Workshop, стр. 10-15. ACM, (2002)Generating Application Ontologies from Reference Ontologies., , , и . AMIA, AMIA, (2008)Optimizing Large-Scale Semi-Naïve Datalog Evaluation in Hadoop., , , и . Datalog, том 7494 из Lecture Notes in Computer Science, стр. 165-176. Springer, (2012)Constructing Services with Interposable Virtual Hardware., , , и . NSDI, стр. 169-182. USENIX, (2004)Active Bridging., , , и . SIGCOMM, стр. 101-111. ACM, (1997)