Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed PCA and Network Anomaly Detection, , , , , and . UCB/EECS-2006-99. EECS Department, University of California, Berkeley, (July 2006)Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links., , and . MobiCom, page 113-119. ACM, (1999)Building Reliable Mobile-Aware Applications Using the Rover Toolkit., and . MobiCom, page 117-129. ACM, (1996)An Architecture for Secure Wide-Area Service Discovery., , , , and . Wireless Networks, 8 (2-3): 213-230 (2002)Mobile computing with the Rover Toolkit.. Massachusetts Institute of Technology, Cambridge, MA, USA, (1998)ndltd.org (oai:dspace.mit.edu:1721.1/46115).A Taxonomy of Cyber Attacks on SCADA Systems., , and . iThings/CPSCom, page 380-388. IEEE Computer Society, (2011)The Datacenter Needs an Operating System., , , , , , , and . HotCloud, USENIX Association, (2011)Analysis of Wide Area User Mobility Patterns., , and . WMCSA, page 30-40. IEEE Computer Society, (2004)Multi-Layer Tracing of TCP over a Reliable Wireless Link., , , , and . SIGMETRICS, page 144-154. ACM, (1999)In-Network PCA and Anomaly Detection., , , , , and . NIPS, page 617-624. MIT Press, (2006)