Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Measurement Study of Peer-to-Peer File Sharing Systems, , and . Proceedings of the Multimedia Computing and Networking Conference, (January 2002)Measurement, modeling, and analysis of a peer-to-peer file-sharing workload, , , , , and . SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, page 314--329. New York, NY, USA, ACM, (2003)Measuring and analyzing the characteristics of Napster and Gnutella hosts, , and . Multimedia Syst., 9 (2): 170--184 (2003)Volley: Automated Data Placement for Geo-Distributed Cloud Services., , , , and . NSDI, page 17-32. USENIX Association, (2010)Stop! Hammer time: rethinking our approach to rowhammer mitigations., , , and . HotOS, page 88-95. ACM, (2021)MOESI-prime: preventing coherence-induced hammering in commodity workloads., , , , and . ISCA, page 670-684. ACM, (2022)Finding Content in File-Sharing Networks When You Can't Even Spell., , , and . IPTPS, (2007)PrivateEye: Scalable and Privacy-Preserving Compromise Detection in the Cloud., , , , , , and . NSDI, page 797-815. USENIX Association, (2020)Lockr: social access control for web 2.0., , , , and . WOSN, page 43-48. ACM, (2008)A Measurement Study of Peer-to-Peer File Sharing Systems, , and . Multimedia Computing and Networking (MMCN), (January 2002)