Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Repeatability and workability evaluation of SIGMOD 2011, , , , , , , , , and 10 other author(s). SIGMOD Record, 40 (2): 45--48 (2011)The Serial Safety Net: Efficient Concurrency Control on Modern Hardware., , , and . DaMoN, page 8:1-8:8. ACM, (2015)Analysis of content copyright infringement in mobile application markets., , , and . eCrime, page 43-52. IEEE, (2015)Forced-Path Execution for Android Applications on x86 Platforms., and . SERE (Companion), page 188-197. IEEE, (2013)Initial spatio-temporal domain expansion of the Modelfest database., , , , , , and . Human Vision and Electronic Imaging, volume 8651 of SPIE Proceedings, page 86510F. SPIE, (2013)Improving OLTP Scalability using Speculative Lock Inheritance., , and . Proc. VLDB Endow., 2 (1): 479-489 (2009)Accelerating the Cloud with Heterogeneous Computing., , and . HotCloud, USENIX Association, (2011)North-Sámi to Finnish rule-based machine translation system., , , , , and . NODALIDA, volume 131 of Linköping Electronic Conference Proceedings, page 115-122. Linköping University Electronic Press / Association for Computational Linguistics, (2017)Fighting back: using observability tools to improve the DBMS (not just diagnose it).. DBTest, page 10. ACM, (2012)Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities., , , and . AsiaCCS, page 777-791. ACM, (2018)