Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perils of Transitive Trust in the Domain Name System., and . Internet Measurement Conference, page 379-384. USENIX Association, (2005)Graceful degradation via versions: specifications and implementations., , , , and . PODC, page 264-273. ACM, (2007)The design and implementation of a next generation name service for the internet., and . SIGCOMM, page 331-342. ACM, (2004)dFault: Fault Localization in Large-Scale Peer-to-Peer Systems., , , and . Middleware, volume 6452 of Lecture Notes in Computer Science, page 252-272. Springer, (2010)Effective and efficient compromise recovery for weakly consistent replication., , , , , , and . EuroSys, page 131-144. ACM, (2009)Fidelity-Aware Replication for Mobile Devices., , , , , and . IEEE Trans. Mob. Comput., 9 (12): 1697-1712 (2010)Caching XML Web Services for Mobility., and . ACM Queue, 1 (3): 70-78 (2003)A Practical Approach to Peer-to-Peer Publish-Subscribe., , and . login Usenix Mag., (2006)Supporting research collaboration through bi-level file synchronization., , , and . GROUP, page 165-174. ACM, (2012)Client Behavior and Feed Characteristics of RSS, a Publish-Subscribe System for Web Micronews., , and . Internet Measurement Conference, page 29-34. USENIX Association, (2005)