Author of the publication

Consistent Query Plan Generation in Secure Cooperative Data Access.

, , and . DBSec, volume 8566 of Lecture Notes in Computer Science, page 227-242. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet of Perishable Logistics., and . IEEE Internet Comput., 21 (1): 22-31 (2017)Mimic: Fast Recovery from Data Corruption Errors in Stencil Computations., and . IPCCC, page 1-8. IEEE, (2019)Multi-state power management of communication links.. COMSNETS, page 1-10. IEEE, (2011)Modular Framework for Data Prefetching and Replacement at the Edge., , , and . EDGE, volume 10973 of Lecture Notes in Computer Science, page 18-33. Springer, (2018)Distributed Energy Adaptive Computing.. ICC, page 1-5. IEEE, (2010)Virtual Link: An Enabler of Enterprise Utility Computing.. ISPA Workshops, volume 4331 of Lecture Notes in Computer Science, page 104-114. Springer, (2006)Improving Packet Delivery Performance of BGP During Large-Scale Failures., , and . GLOBECOM, page 1850-1854. IEEE, (2007)Experimental Evaluation of a Near-Field Magnetic Induction Based Communication System., , and . WCNC, page 1-6. IEEE, (2019)Performance Analysis of Parallel Search Algorithms on Multiprocessors., and . Performance, page 407-421. North-Holland, (1990)Security Considerations in Data Center Configuration Management., , and . SafeConfig, IEEE, (2011)