From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Live Monitoring: Using Adaptive Instrumentation and Analysis to Debug and Maintain Web Applications., и . HotOS, USENIX Association, (2007)Practical end-to-end web content integrity., , , , и . WWW, стр. 659-668. ACM, (2012)Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers., , , , , , и . USENIX Security Symposium, стр. 415-430. USENIX Association, (2013)Finding diversity in remote code injection exploits., , , , и . Internet Measurement Conference, стр. 53-64. ACM, (2006)Virtual Playgrounds for Worm Behavior Investigation., , , и . RAID, том 3858 из Lecture Notes in Computer Science, стр. 1-21. Springer, (2005)Supporting Heterogeneity and Congestion Control in Peer-to-Peer Multicast Streaming., , и . IPTPS, том 3279 из Lecture Notes in Computer Science, стр. 54-63. Springer, (2004)Clickjacking: Attacks and Defenses., , , , и . USENIX Security Symposium, стр. 413-428. USENIX Association, (2012)Server-based Inference of Internet Link Lossiness., , и . INFOCOM, стр. 145-155. IEEE Computer Society, (2003)Enabling Security in Cloud Storage SLAs with CloudProof., , , , и . USENIX ATC, USENIX Association, (2011)Automatic Misconfiguration Troubleshooting with PeerPressure., , , , и . OSDI, стр. 245-258. USENIX Association, (2004)