From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Managing Contention with Medley., , и . IEEE Trans. Mob. Comput., 14 (3): 579-591 (2015)DefenestraTor: Throwing Out Windows in Tor., , , , , , и . PETS, том 6794 из Lecture Notes in Computer Science, стр. 134-154. Springer, (2011)Understanding Availability., , и . IPTPS, том 2735 из Lecture Notes in Computer Science, стр. 256-267. Springer, (2003)Knock it off: profiling the online storefronts of counterfeit merchandise., , , и . KDD, стр. 1759-1768. ACM, (2014)Access and mobility of wireless PDA users., и . ACM SIGMOBILE Mob. Comput. Commun. Rev., 9 (2): 40-55 (2005)Report on the SIGMETRICS '98/PERFORMANCE '98 Joint International Conference on Measuerment and Modeling of Computer Systems.. ACM SIGOPS Oper. Syst. Rev., 32 (4): 3-8 (1998)Detecting and Characterizing Lateral Phishing at Scale., , , , , , , и . USENIX Security Symposium, стр. 1273-1290. USENIX Association, (2019)Implementing Cooperative Prefetching and Caching in a Globally-Managed Memory System., , , , , , и . SIGMETRICS, стр. 33-43. ACM, (1998)An Empirical Analysis of Enterprise-Wide Mandatory Password Updates., , , и . ACSAC, стр. 150-162. ACM, (2023)Dual Frame Motion Compensation with Uneven Quality Assignment., , и . Data Compression Conference, стр. 262-271. IEEE Computer Society, (2004)