Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policy-based access control for weakly consistent replication., , and . EuroSys, page 293-306. ACM, (2010)Extending SSD Lifetimes with Disk-Based Write Caches., , , and . FAST, page 101-114. USENIX, (2010)Contrail: Enabling Decentralized Social Networks on Smartphones., , , , , , and . Middleware, volume 7049 of Lecture Notes in Computer Science, page 41-60. Springer, (2011)A Logical Account of NGSCB., and . FORTE, volume 3235 of Lecture Notes in Computer Science, page 1-12. Springer, (2004)Supporting research collaboration through bi-level file synchronization., , , and . GROUP, page 165-174. ACM, (2012)How dynamic are IP addresses?, , , , , and . SIGCOMM, page 301-312. ACM, (2007)Sealing OS processes to improve dependability and safety., , , , , , , , , and . EuroSys, page 341-354. ACM, (2007)Effective and efficient compromise recovery for weakly consistent replication., , , , , , and . EuroSys, page 131-144. ACM, (2009)Docx2Go: collaborative editing of fidelity reduced documents on mobile devices., , , , , and . MobiSys, page 345-356. ACM, (2010)Broad New OS Research: Challenges and Opportunities., , , and . HotOS, USENIX Association, (2005)