From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identifying suspicious URLs: an application of large-scale online learning., , , и . ICML, том 382 из ACM International Conference Proceeding Series, стр. 681-688. ACM, (2009)Beyond blacklists: learning to detect malicious web sites from suspicious URLs., , , и . KDD, стр. 1245-1254. ACM, (2009)Fast and Interactive Analytics over Hadoop Data with Spark., , , , , , , , и . login Usenix Mag., (2012)Scaling the mobile millennium system in the cloud., , , , , , , и . SoCC, стр. 28. ACM, (2011)An intermittent energy internet architecture., , , , и . e-Energy, стр. 5. ACM, (2012)The energy and emergy of the internet., и . HotNets, стр. 9. ACM, (2011)Managing data transfers in computer clusters with orchestra., , , , и . SIGCOMM, стр. 98-109. ACM, (2011)Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing., , , , , , , , и . NSDI, стр. 15-28. USENIX Association, (2012)Finding diversity in remote code injection exploits., , , , и . Internet Measurement Conference, стр. 53-64. ACM, (2006)Learning to detect malicious URLs., , , и . ACM TIST, 2 (3): 30:1-30:24 (2011)