Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting research collaboration through bi-level file synchronization., , , and . GROUP, page 165-174. ACM, (2012)How dynamic are IP addresses?, , , , , and . SIGCOMM, page 301-312. ACM, (2007)Extending SSD Lifetimes with Disk-Based Write Caches., , , and . FAST, page 101-114. USENIX, (2010)From paxos to CORFU: a flash-speed shared log., , , , and . ACM SIGOPS Oper. Syst. Rev., 46 (1): 47-51 (2012)Policy-based access control for weakly consistent replication., , and . EuroSys, page 293-306. ACM, (2010)Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones., , , , , , and . IEEE Internet Comput., 18 (5): 44-51 (2014)Contrail: Enabling Decentralized Social Networks on Smartphones., , , , , , and . Middleware, volume 7049 of Lecture Notes in Computer Science, page 41-60. Springer, (2011)A Logical Account of NGSCB., and . FORTE, volume 3235 of Lecture Notes in Computer Science, page 1-12. Springer, (2004)Sealing OS processes to improve dependability and safety., , , , , , , , , and . EuroSys, page 341-354. ACM, (2007)Effective and efficient compromise recovery for weakly consistent replication., , , , , , and . EuroSys, page 131-144. ACM, (2009)