Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual Tree: A Robust Overlay Network for Ensuring Interval Valid Queries in Dynamic Distributed Systems., , , and . ICDCN, volume 7129 of Lecture Notes in Computer Science, page 197-200. Springer, (2012)A theoretical evaluation of peer-to-peer internal clock synchronization., , , and . Autonomics, page 1. ICST, (2008)Principled Composition of Function Variants for Dynamic Software Diversity and Program Protection., , and . ASE, page 183:1-183:5. ACM, (2022)Android malware family classification based on resource consumption over time., , , , , and . MALWARE, page 31-38. IEEE Computer Society, (2017)On The Accuracy of Event Distribution Lists for Publish/Subscribe in Dynamic Distributed Systems., , , , , and . ICDCS Workshops, page 31. IEEE Computer Society, (2006)Structure-less content-based routing in mobile ad hoc networks., , , , and . ICPS, page 37-46. IEEE Computer Society, (2005)Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization., , , and . CCS, page 715-733. ACM, (2021)Harnessing the power of DHTs to build dynamic quorums in large-scale enterprise infrastructures., , , , and . LADIS, page 5:1-5:7. ACM, (2008)Exploiting user feedback for online filtering in event-based systems., , , and . SAC, page 2021-2026. ACM, (2016)A Hint-Based Probabilistic Protocol for Unicast Communications in MANETs., , and . ICPADS (1), page 432-438. IEEE Computer Society, (2005)