Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Information Funnel: Exploiting Named Data for Information-Maximizing Data Collection., , , , , , , , , and 4 other author(s). DCOSS, page 92-100. IEEE Computer Society, (2014)Identifying requirements for Business Contract Language: a Monitoring Perspectiv., , , , , and . EDOC, page 50-61. IEEE Computer Society, (2003)Hybrid protection in express optical networks., and . DRCN, page 1-6. IEEE, (2003)Supporting Contract Execution through Recommended Workflows., , , and . DEXA, volume 3180 of Lecture Notes in Computer Science, page 1-12. Springer, (2004)The Architecture of a New Storage and Retrieval System for Scientific Studies., and . IKE, page 35-41. CSREA Press, (2006)Wormhole: Reliable Pub-Sub to Support Geo-replicated Internet Services., , , , , , , , , and 12 other author(s). NSDI, page 351-366. USENIX Association, (2015)Poster abstract: information-maximizing data collection in social sensing using named-data., , , , , , , , , and 3 other author(s). IPSN, page 303-304. IEEE/ACM, (2014)High-Dimensional Similarity Search Using Data-Sensitive Space Partitioning., and . DEXA, volume 4080 of Lecture Notes in Computer Science, page 738-750. Springer, (2006)Twine: A Unified Cluster Management System for Shared Infrastructure., , , , , , , , , and 10 other author(s). OSDI, page 787-803. USENIX Association, (2020)Tutorial T5: High Performance Low Power Designs - Challenges and Best practices in Design, Verification and Test., , and . VLSID, page 10-11. IEEE Computer Society, (2015)