Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building Distributed Systems with Informational Flow Control.. Cornell University, USA, (2015)Secure web applications via automatic partitioning, , , , , , and . SIGOPS Oper. Syst. Rev., (October 2007)Ripley: automatically securing web 2.0 applications through replicated execution., , and . ACM Conference on Computer and Communications Security, page 173-186. ACM, (2009)NaVaSH: Examination Software for ICT Based Institutions., , , , and . T4E, page 178-181. IEEE Computer Society, (2014)OlyMPIx - A Program Parallelization Tool using MPI on Computational Grids., , and . Parallel and Distributed Computing and Networks, page 307-312. IASTED/ACTA Press, (2005)SIF: Enforcing Confidentiality and Integrity in Web Applications., , and . USENIX Security Symposium, USENIX Association, (2007)Fabric: a platform for secure distributed computation and storage., , , , , and . SOSP, page 321-334. ACM, (2009)Corrigendum: Software for Brain Network Simulations: A Comparative Study., , , and . Frontiers Neuroinformatics, (2018)Moore's Law in CLEAR Light., , , and . CoRR, (2016)Scaling scientific applications on clusters of hybrid multicore/GPU nodes., , , and . Conf. Computing Frontiers, page 6. ACM, (2011)