Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing key issuing in peer-to-peer networks., , , , , , and . SAC, page 84-85. ACM, (2009)Efficient GPU Sharing for Serverless Workflows., , , , , , , , and . HiPS@HPDC, page 17-24. ACM, (2021)Non-tracking web analytics., , , , and . CCS, page 687-698. ACM, (2012)Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks., , , , , and . Peer-to-Peer Computing, page 22-29. IEEE Computer Society, (2008)Gradient Compression Supercharged High-Performance Data Parallel DNN Training., , , , , , , and . SOSP, page 359-375. ACM, (2021)WebIBC: Identity Based Cryptography for Client Side Security in Web Applications., , , , , and . ICDCS, page 689-696. IEEE Computer Society, (2008)SMALTA: practical and near-optimal FIB aggregation., , , , , , , and . CoNEXT, page 29. ACM, (2011)Bring order to online social networks., , and . INFOCOM, page 541-545. IEEE, (2011)Hybrid Overlay Structure Based on Virtual Node., , , , and . ISCC, page 1091-1098. IEEE Computer Society, (2007)Online Algorithm for Approximate Quantile Queries on Sliding Windows., , , and . SEA, volume 9685 of Lecture Notes in Computer Science, page 369-384. Springer, (2016)