Author of the publication

You are who you know: inferring user profiles in online social networks

, , , and . Proceedings of the third ACM international conference on Web search and data mining, page 251--260. New York, NY, USA, ACM, (2010)
DOI: 10.1145/1718487.1718519

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ERIM: Secure and Efficient In-process Isolation with Memory Protection Keys., , , and . CoRR, (2018)Exploiting Social Networks for Internet Search, and . Proceedings of the 5 th Workshop on Hot Topics in Networks(HotNets ' 06), (2006)Fbufs: A High-Bandwidth Cross-Domain Transfer Facility., and . SOSP, page 189-202. ACM, (1993)Operating System Review 27(5).Squirrel: a decentralized peer-to-peer web cache., , and . PODC, page 213-222. ACM, (2002)Experiences with a High-Speed Network Adaptor: A Software Perspective., , and . SIGCOMM, page 2-13. ACM, (1994)Thoth: Comprehensive Policy Compliance in Data Retrieval Systems., , , , and . USENIX Security Symposium, page 637-654. USENIX Association, (2016)Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud., , , , , and . USENIX Security Symposium, page 2819-2838. USENIX Association, (2022)Groundhog: Efficient Request Isolation in FaaS., , , and . EuroSys, page 398-415. ACM, (2023)Keynote The Renaissance of Decentralized Systems.. HPDC, page 1-4. IEEE, (2006)Optimizing Routing in Structured Peer-to-Peer Overlay Networks Using Routing Table Redundancy., , and . FTDCS, page 315-321. IEEE Computer Society, (2003)