Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing data retention policies at scale., , , and . Integrated Network Management, page 57-64. IEEE, (2011)Password-Authenticated Key Exchange Based on RSA., , and . ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 599-613. Springer, (2000)Framework and algorithms for collaborative compression., and . ISIT, page 2317-2321. IEEE, (2008)Buttress: A Toolkit for Flexible and High Fidelity I/O Benchmarking., , , and . FAST, page 45-58. USENIX, (2004)Remote storage with byzantine servers., and . SPAA, page 280-289. ACM, (2009)Auditing to Keep Online Storage Services Honest., , , and . HotOS, USENIX Association, (2007)Value-maximizing deadline scheduling and its application to animation rendering., , , , , , , , , and . SPAA, page 299-308. ACM, (2005)Deploying Mesh Nodes under Non-Uniform Propagation., , , and . INFOCOM, page 2142-2150. IEEE, (2010)Adding Capacity Points to a Wireless Mesh Network Using Local Search., , , and . INFOCOM, page 1247-1255. IEEE, (2008)Deadline scheduling for animation rendering., , , , , , , , , and . SIGMETRICS, page 384-385. ACM, (2005)