Author of the publication

Peer-to-Peer Caching Schemes to Address Flash Crowds.

, , and . IPTPS, volume 2429 of Lecture Notes in Computer Science, page 203-213. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Data Preservers for Web Services., , and . WebApps, USENIX Association, (2011)2 P2P or Not 2 P2P?, , , , , and . IPTPS, volume 3279 of Lecture Notes in Computer Science, page 33-43. Springer, (2004)Predicting Execution Time of Computer Programs Using Sparse Polynomial Regression., , , , , and . NIPS, page 883-891. Curran Associates, Inc., (2010)Loss and Delay Accountability for the Internet., , , , and . ICNP, page 194-205. IEEE Computer Society, (2007)Towards verifiable resource accounting for outsourced computation., , , , and . VEE, page 167-178. ACM, (2013)KGym: A Platform and Dataset to Benchmark Large Language Models on Linux Kernel Crash Resolution., , , , , , and . CoRR, (2024)Using queries for distributed monitoring and forensics., , , and . EuroSys, page 389-402. ACM, (2006)Verifiable resource accounting for cloud computing services., and . CCSW, page 21-26. ACM, (2011)Snowboard: Finding Kernel Concurrency Bugs through Systematic Inter-thread Communication Analysis., , , and . SOSP, page 66-83. ACM, (2021)Impeding attrition attacks in P2P systems., , , , and . ACM SIGOPS European Workshop, page 12. ACM, (2004)