From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securing key issuing in peer-to-peer networks., , , , , , и . SAC, стр. 84-85. ACM, (2009)Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service, , , , и . CoRR, (2011)Efficient GPU Sharing for Serverless Workflows., , , , , , , , и . HiPS@HPDC, стр. 17-24. ACM, (2021)Phagocytes: A Holistic Defense and Protection Against Active P2P Worms, , , , и . CoRR, (2011)Privacy-Preserving Data Analytics., , , , , и . Encyclopedia of Big Data Technologies, Springer, (2019)Gradient Compression Supercharged High-Performance Data Parallel DNN Training., , , , , , , и . SOSP, стр. 359-375. ACM, (2021)Non-tracking web analytics., , , , и . CCS, стр. 687-698. ACM, (2012)Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks., , , , , и . Peer-to-Peer Computing, стр. 22-29. IEEE Computer Society, (2008)WebIBC: Identity Based Cryptography for Client Side Security in Web Applications., , , , , и . ICDCS, стр. 689-696. IEEE Computer Society, (2008)Approximate Computing for Stream Analytics., , , , , и . Encyclopedia of Big Data Technologies, Springer, (2019)