From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Leveraging Good Intentions to Reduce Malicious Network Traffic.. SRUTI, USENIX Association, (2006)On Improving User Response Times in Tableau., , , , и . SIGMOD Conference, стр. 1695-1706. ACM, (2015)Generating Application Ontologies from Reference Ontologies., , , и . AMIA, AMIA, (2008)Denali: a scalable isolation kernel., , и . ACM SIGOPS European Workshop, стр. 10-15. ACM, (2002)Scale and Performance in the Denali Isolation Kernel., , и . OSDI, USENIX Association, (2002)Operating Systems Review 36, Special Issue, Winter 2002.Optimizing Large-Scale Semi-Naïve Datalog Evaluation in Hadoop., , , и . Datalog, том 7494 из Lecture Notes in Computer Science, стр. 165-176. Springer, (2012)Constructing Services with Interposable Virtual Hardware., , , и . NSDI, стр. 169-182. USENIX, (2004)Active Bridging., , , и . SIGCOMM, стр. 101-111. ACM, (1997)A Dataflow Graph Transformation Language and Query Rewriting System for RDF Ontologies., , , и . SSDBM, том 7338 из Lecture Notes in Computer Science, стр. 544-561. Springer, (2012)