Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service, , , , and . CoRR, (2011)Securing key issuing in peer-to-peer networks., , , , , , and . SAC, page 84-85. ACM, (2009)Efficient GPU Sharing for Serverless Workflows., , , , , , , , and . HiPS@HPDC, page 17-24. ACM, (2021)Phagocytes: A Holistic Defense and Protection Against Active P2P Worms, , , , and . CoRR, (2011)Privacy-Preserving Data Analytics., , , , , and . Encyclopedia of Big Data Technologies, Springer, (2019)Non-tracking web analytics., , , , and . CCS, page 687-698. ACM, (2012)Gradient Compression Supercharged High-Performance Data Parallel DNN Training., , , , , , , and . SOSP, page 359-375. ACM, (2021)Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks., , , , , and . Peer-to-Peer Computing, page 22-29. IEEE Computer Society, (2008)WebIBC: Identity Based Cryptography for Client Side Security in Web Applications., , , , , and . ICDCS, page 689-696. IEEE Computer Society, (2008)SMLT: A Serverless Framework for Scalable and Adaptive Machine Learning Design and Training., , , , , and . CoRR, (2022)