Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PopperCI: Automated reproducibility validation., , , , , , and . INFOCOM Workshops, page 450-455. IEEE, (2017)Trusted Disk Loading in the Emulab Network Testbed., , , and . CSET, USENIX Association, (2010)Is Big Data Performance Reproducible in Modern Cloud Networks?, , , , , , , and . NSDI, page 513-527. USENIX Association, (2020)Fluorescence: Detecting Kernel-Resident Malware in Clouds., , , , , and . RAID, page 367-382. USENIX Association, (2019)OpenEdge: A dynamic and secure open service edge network., , , , , and . NOMS, page 257-264. IEEE, (2016)Harpocrates: Giving Out Your Secrets and Keeping Them Too., , , and . SEC, page 103-114. IEEE, (2018)GPUstore: harnessing GPU computing for storage systems in the OS kernel., , and . SYSTOR, page 6. ACM, (2012)Large-scale Virtualization in the Emulab Network Testbed., , , , , , , and . USENIX ATC, page 113-128. USENIX Association, (2008)Avoiding the Ordering Trap in Systems Performance Measurement., , , , , , , , and . USENIX ATC, page 373-386. USENIX Association, (2023)Where The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Them., , , , and . NSDI, USENIX Association, (2024)