From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Guarded Modules: Adaptively Extending the VMM's Privilege Into the Guest., и . ICAC, стр. 85-96. USENIX Association, (2014)Understanding end-user perception of network problems., , , , и . W-MUST@SIGCOMM, стр. 43-48. ACM, (2011)Demo: indoor localization without infrastructure using the acoustic background spectrum., , , и . MobiSys, стр. 385-386. ACM, (2011)Dynamic adaptive virtual core mapping to improve power, energy, and performance in multi-socket multicores., , , и . HPDC, стр. 247-258. ACM, (2012)Transparent network services via a virtual traffic layer for virtual machines., и . HPDC, стр. 23-32. ACM, (2007)An optimization problem in adaptive virtual environments., , , и . SIGMETRICS Perform. Evaluation Rev., 33 (2): 6-8 (2005)Reversible sketches: enabling monitoring and analysis over high-speed data streams., , , , , , , , и . IEEE/ACM Trans. Netw., 15 (5): 1059-1072 (2007)Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications., , , , , , , , и . INFOCOM, IEEE, (2006)Power reduction through measurement and modeling of users and CPUs: summary., , , , и . SIGMETRICS, стр. 363-364. ACM, (2007)Addressing the trust asymmetry problem in grid computing with encrypted computation.. LCR, стр. 7:1-7:7. ACM, (2004)