Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contrail: Enabling Decentralized Social Networks on Smartphones., , , , , , and . Middleware, volume 7049 of Lecture Notes in Computer Science, page 41-60. Springer, (2011)A Logical Account of NGSCB., and . FORTE, volume 3235 of Lecture Notes in Computer Science, page 1-12. Springer, (2004)Policy-based access control for weakly consistent replication., , and . EuroSys, page 293-306. ACM, (2010)Extending SSD Lifetimes with Disk-Based Write Caches., , , and . FAST, page 101-114. USENIX, (2010)Supporting research collaboration through bi-level file synchronization., , , and . GROUP, page 165-174. ACM, (2012)How dynamic are IP addresses?, , , , , and . SIGCOMM, page 301-312. ACM, (2007)Sealing OS processes to improve dependability and safety., , , , , , , , , and . EuroSys, page 341-354. ACM, (2007)Effective and efficient compromise recovery for weakly consistent replication., , , , , , and . EuroSys, page 131-144. ACM, (2009)DISC 2011 Invited Lecture by Dahlia Malkhi: Going beyond Paxos., , , and . DISC, volume 6950 of Lecture Notes in Computer Science, page 208-210. Springer, (2011)Fidelity-aware replication for mobile devices., , , , and . MobiSys, page 83-94. ACM, (2009)