From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design and Implementation of a High-Performance Network Intrusion Prevention System., , и . SEC, том 181 из IFIP, стр. 359-374. Springer, (2005)Divide et Impera: Partitioning Unstructured Peer-to-Peer Systems to Improve Resource Location., , , , и . CoreGRID Integration Workshop, стр. 1-12. Springer, (2006)Topic 3: Scheduling and Load Balancing., , , и . Euro-Par, том 3149 из Lecture Notes in Computer Science, стр. 220-221. Springer, (2004)The Remote Enqueue Operation on Networks of Workstations., , и . CANPC, том 1362 из Lecture Notes in Computer Science, стр. 1-14. Springer, (1998)ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches., , , и . ACNS, том 7341 из Lecture Notes in Computer Science, стр. 400-417. Springer, (2012)Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing Modes., , и . ICETE (2), стр. 192-200. ScitePress, (2020)First-Class User-Level Theads., , , и . SOSP, стр. 110-121. ACM, (1991)Operating System Review 25(5).Improving the performance of passive network monitoring applications with memory locality enhancements., , , , и . Comput. Commun., 35 (1): 129-140 (2012)Web-conscious storage management for web proxies., , , и . IEEE/ACM Trans. Netw., 10 (6): 735-748 (2002)Compromising Anonymity Using Packet Spinning., , , и . ISC, том 5222 из Lecture Notes in Computer Science, стр. 161-174. Springer, (2008)