From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Remote storage with byzantine servers., и . SPAA, стр. 280-289. ACM, (2009)Value-maximizing deadline scheduling and its application to animation rendering., , , , , , , , , и . SPAA, стр. 299-308. ACM, (2005)Auditing to Keep Online Storage Services Honest., , , и . HotOS, USENIX Association, (2007)Deploying Mesh Nodes under Non-Uniform Propagation., , , и . INFOCOM, стр. 2142-2150. IEEE, (2010)Adding Capacity Points to a Wireless Mesh Network Using Local Search., , , и . INFOCOM, стр. 1247-1255. IEEE, (2008)Managing data retention policies at scale., , , и . Integrated Network Management, стр. 57-64. IEEE, (2011)Password-Authenticated Key Exchange Based on RSA., , и . ASIACRYPT, том 1976 из Lecture Notes in Computer Science, стр. 599-613. Springer, (2000)Framework and algorithms for collaborative compression., и . ISIT, стр. 2317-2321. IEEE, (2008)Buttress: A Toolkit for Flexible and High Fidelity I/O Benchmarking., , , и . FAST, стр. 45-58. USENIX, (2004)An Experimental Study of Data Migration Algorithms., , , , , , , и . WAE, том 2141 из Lecture Notes in Computer Science, стр. 145-158. Springer, (2001)