Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online data mining services for dynamic spatial databases II: air quality location based services and sonification, , , , , , , , , and . II International Conference and Exhibition on Geographic Information, (2005)Should we build Gnutella on a structured overlay?, , and . SIGCOMM Comput. Commun. Rev., 34 (1): 131--136 (2004)Vigilante: end-to-end containment of internet worms., , , , , , and . SOSP, page 133-147. ACM, (2005)3D environments as social learning tools: the VIRTU@LIS experience., , , , , , , , and . SIGGRAPH Educators Program, page 1. ACM, (2005)Better bug reporting with better privacy., , and . ASPLOS, page 319-328. ACM, (2008)Observing and Preventing Leakage in MapReduce., , , , , and . CCS, page 1570-1581. ACM, (2015)Broom: Sweeping Out Garbage Collection from Big Data Systems., , , , , , , , , and . HotOS, USENIX Association, (2015)IA-CCF: Individual Accountability for Permissioned Ledgers., , , , , , , , , and 5 other author(s). NSDI, page 467-491. USENIX Association, (2022)Efficient and Flexible Object Sharing., , , and . ICPP, Vol. 1, page 128-137. IEEE Computer Society, (1996)Lightweight Logging for Lazy Release Consistent Distributed Shared Memory., , , , and . OSDI, page 59-73. ACM, (1996)Operating Systems Review 30, Special Issue, October 1996.