Author of the publication

Traffic Data: Exploratory Data Analysis with Apache Accumulo.

, , , , and . TRAP, volume 728 of Advances in Intelligent Systems and Computing, page 129-143. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Reliable Multicast Approach to Replica Management for Grids., and . Parallel and Distributed Computing and Networks, page 282-288. IASTED/ACTA Press, (2005)Reliable secure multicast data transmission and applications.. Sapienza University of Rome, Italy, (2004)Secure virtualization for cloud computing., and . J. Netw. Comput. Appl., 34 (4): 1113-1122 (2011)A Security Management Architecture for the Protection of Kernel Virtual Machines., and . CIT, page 948-953. IEEE Computer Society, (2010)Traffic Data: Exploratory Data Analysis with Apache Accumulo., , , , and . TRAP, volume 728 of Advances in Intelligent Systems and Computing, page 129-143. Springer, (2017)AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing., , , and . UIC/ATC, page 371-379. IEEE Computer Society, (2013)Transparent security for cloud., and . SAC, page 414-415. ACM, (2010)Leveraging the Grid for the Autonomic Management of Complex Infrastructures., , , and . GCA, page 32-37. CSREA Press, (2006)Analysing the tor web with high performance graph algorithms., , , , and . CF, page 342. ACM, (2019)Edge Computing Perspectives: Architectures, Technologies, and Open Security Issues., , , and . EDGE, page 116-123. IEEE, (2019)