Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Searching for Rare Objects Using Index Replication., , and . INFOCOM, page 1723-1731. IEEE, (2008)Docx2Go: collaborative editing of fidelity reduced documents on mobile devices., , , , , and . MobiSys, page 345-356. ACM, (2010)Preserving privacy in location-based mobile social applications., and . HotMobile, page 1-6. ACM, (2010)User interactions in social networks and their implications., , , , and . EuroSys, page 205-218. ACM, (2009)Silverline: toward data confidentiality in storage-intensive cloud applications., , and . SoCC, page 10. ACM, (2011)Protecting cloud data using dynamic inline fingerprint checks., , , and . INFOCOM, page 2877-2885. IEEE, (2013)Lowering Inter-datacenter Bandwidth Costs via Bulk Data Scheduling., and . CCGRID, page 244-251. IEEE Computer Society, (2012)Frugal storage for cloud file systems., , and . EuroSys, page 71-84. ACM, (2012)Anonygator: Privacy and Integrity Preserving Data Aggregation., , and . Middleware, volume 6452 of Lecture Notes in Computer Science, page 85-106. Springer, (2010)An ensemble of replication and erasure codes for cloud file systems., , , and . INFOCOM, page 1276-1284. IEEE, (2013)