Author of the publication

FASTEN: Towards a FAult-Tolerant and STorage EfficieNt Cloud: Balancing Between Replication and Deduplication.

, , , , , and . CCNC, page 44-50. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Threat Model and Security Analysis of Video Conferencing Systems., and . CCNC, page 1-4. IEEE, (2021)X-Fidence: Post-Pandemic Wellness By Density Monitoring with Privacy Preservation., and . CCNC, page 578-583. IEEE, (2022)A Deep Dive into the Google Cluster Workload Traces: Analyzing the Application Failure Characteristics and User Behaviors., , , , and . CoRR, (2023)Towards a Threat Model and Privacy Analysis for V2P in 5G Networks., and . 5GWF, page 383-387. IEEE, (2021)Someone to Watch Over You: Using Bluetooth Beacons for Alerting Distracted Pedestrians., , , , , and . IEEE Internet Things J., 9 (22): 23017-23030 (2022)StreetBit: A Bluetooth Beacon-based Personal Safety Application for Distracted Pedestrians., , , , , and . CCNC, page 1-2. IEEE, (2021)Towards a Threat Model and Security Analysis of Spacecraft Computing Systems., and . WiSEE, page 87-92. IEEE, (2022)FASTEN: Towards a FAult-tolerant and STorage EfficieNt Cloud: Balancing Between Replication and Deduplication., , , , , and . CoRR, (2023)RoadNote: Automated Road Closure Detection using Urban Sensing., and . WF-IoT, page 1-6. IEEE, (2022)Towards a Threat Model and Security Analysis for Contact Tracing Applications., , and . WF-IoT, page 1-6. IEEE, (2022)