Author of the publication

Forensix: A Robust, High-Performance Reconstruction System.

, , , , and . ICDCS Workshops, page 155-162. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ARMADA Middleware and Communication Services., , , , , , , , , and 3 other author(s). Real Time Syst., 16 (2-3): 127-153 (1999)Have I Been Exploited? - A Registry of Vulnerable Ethereum Smart Contracts., and . ICBC, volume 12404 of Lecture Notes in Computer Science, page 221-228. Springer, (2020)Performance Evaluation of Smoothing Algorithms for Transmitting Prerecorded Variable-Bit-Rate Video., and . IEEE Trans. Multim., 1 (3): 302-313 (1999)mod_kaPoW: mitigating DoS with transparent proof-of-work., and . CoNEXT, page 74. ACM, (2007)Patch scheduling for on-line games., and . NETGAMES, page 1-6. ACM, (2005)Panoptes: scalable low-power video sensor networking technologies., , , , , and . ACM Multimedia, page 562-571. ACM, (2003)Measurement-based Characterization of a Collection of On-line Games (Awarded Best Student Paper!)., , , and . Internet Measurement Conference, page 1-14. USENIX Association, (2005)PlayerRating: A reputation system for multiplayer online games., and . NETGAMES, page 1-6. IEEE, (2009)Thunder CTF: Learning Cloud Security on a Dime., and . CoRR, (2021)A "Divergent"-Themed CTF and Urban Race for Introducing Security and Cryptography.. ASE @ USENIX Security Symposium, USENIX Association, (2016)