From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Should we build Gnutella on a structured overlay?, , и . SIGCOMM Comput. Commun. Rev., 34 (1): 131--136 (2004)Online data mining services for dynamic spatial databases II: air quality location based services and sonification, , , , , , , , , и . II International Conference and Exhibition on Geographic Information, (2005)Vigilante: end-to-end containment of internet worms., , , , , , и . SOSP, стр. 133-147. ACM, (2005)Broom: Sweeping Out Garbage Collection from Big Data Systems., , , , , , , , , и . HotOS, USENIX Association, (2015)3D environments as social learning tools: the VIRTU@LIS experience., , , , , , , , и . SIGGRAPH Educators Program, стр. 1. ACM, (2005)Better bug reporting with better privacy., , и . ASPLOS, стр. 319-328. ACM, (2008)Observing and Preventing Leakage in MapReduce., , , , , и . CCS, стр. 1570-1581. ACM, (2015)Confidential Container Groups: Implementing confidential computing on Azure container instances., , , , , , , и . ACM Queue, (марта 2024)Efficient and Flexible Object Sharing., , , и . ICPP, Vol. 1, стр. 128-137. IEEE Computer Society, (1996)IA-CCF: Individual Accountability for Permissioned Ledgers., , , , , , , , , и 5 other автор(ы). NSDI, стр. 467-491. USENIX Association, (2022)