Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aggregation and Degradation in JetStream: Streaming Analytics in the Wide Area., , , , and . NSDI, page 275-288. USENIX Association, (2014)Above the Clouds: A Berkeley View of Cloud Computing, , , , , , , , , and . (2009)Precomputing possible configuration error diagnoses., and . ASE, page 193-202. IEEE Computer Society, (2011)Static extraction of program configuration options., and . ICSE, page 131-140. ACM, (2011)Personal knowledge questions for fallback authentication: security questions in the era of Facebook.. SOUPS, page 13-23. ACM, (2008)Making Every Bit Count in Wide-Area Analytics., , , , and . HotOS, USENIX Association, (2013)Above the Clouds: A Berkeley View of Cloud Computing, , , , , , , , , and 1 other author(s). UCB/EECS-2009-28. EECS Department, University of California, Berkeley, (February 2009)Chukwa: A System for Reliable Large-Scale Log Collection., and . LISA, USENIX Association, (2010)Using Program Analysis to Reduce Misconfiguration in Open Source Systems Software.. University of California, Berkeley, USA, (2012)base-search.net (ftcdlib:qt8937c2v6).How not to survey developers and repositories: experiences analyzing language adoption., and . PLATEAU, page 7-16. ACM, (2012)