From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Increasing network resilience through edge diversity in NEBULA., , , , , , , и . ACM SIGMOBILE Mob. Comput. Commun. Rev., 16 (3): 14-20 (2012)Fairness and isolation in multi-tenant storage as optimization decomposition., , и . ACM SIGOPS Oper. Syst. Rev., 47 (1): 16-21 (2013)Tarzan: a peer-to-peer anonymizing network layer., и . ACM Conference on Computer and Communications Security, стр. 193-206. ACM, (2002)Privacy Engineering for Digital Rights Management Systems., , , и . Digital Rights Management Workshop, том 2320 из Lecture Notes in Computer Science, стр. 76-105. Springer, (2001)SANE: a protection architecture for enterprise networks, , , , , , и . Proceedings of the 15th conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA, (2006)The Free Haven Project: Reputation, , и . (2002)Scalable flow-based networking with DIFANE., , , и . SIGCOMM, стр. 351-362. ACM, (2010)A Scalable Server for 3D Metaverses., , , , , , и . USENIX Annual Technical Conference, стр. 209-222. USENIX Association, (2012)From Feast to Famine: Managing Mobile Network Resources Across Environments and Preferences., , и . TRIOS, USENIX Association, (2014)Efficient Private Techniques for Verifying Social Proximity., и . IPTPS, (2007)