Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Leakage in Mobile Online Social Networks., and . WOSN, USENIX Association, (2010)What are our standards for validation of measurement-based networking research?, and . SIGMETRICS Perform. Evaluation Rev., 36 (2): 64-69 (2008)Fast prefix matching of bounded strings., , , , and . ACM Journal of Experimental Algorithmics, (2003)Measurement and analysis of OSN ad auctions., , , , and . COSN, page 139-150. ACM, (2014)Privacy diffusion on the web: a longitudinal perspective., and . WWW, page 541-550. ACM, (2009)Piggyback Server Invalidation for Proxy Cache Coherency., and . Comput. Networks, 30 (1-7): 185-193 (1998)A short walk in the Blogistan., and . Comput. Networks, 50 (5): 615-630 (2006)Provence: A Process Visualisation and Enactment Environment., and . ESEC, volume 717 of Lecture Notes in Computer Science, page 451-465. Springer, (1993)Piggybacking Network Functions on SDN Reactive Routing: A Feasibility Study., , , and . SOSR, page 34-40. ACM, (2017)Analyzing facebook privacy settings: user expectations vs. reality, , , and . Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, page 61--70. New York, NY, USA, ACM, (2011)