Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building Applications for Ubiquitous Computing Environments., , and . Pervasive, volume 2414 of Lecture Notes in Computer Science, page 16-29. Springer, (2002)A Technique for Documenting the Framework of an Object-Oriented System., and . Computing Systems, 6 (4): 363-389 (1993)Keynote Speech: 2K: An OS for the New Millennium.. ECOOP Workshops, volume 1743 of Lecture Notes in Computer Science, page 24-25. Springer, (1999)Stateful Scalable Stream Processing at LinkedIn., , , , , , and . Proc. VLDB Endow., 10 (12): 1634-1645 (2017)CryptVMI: a flexible and encrypted virtual machine introspection system in the cloud., , and . SCC@ASIACCS, page 11-18. ACM, (2014)KNOW Why your access was denied: regulating feedback for usable security., , and . CCS, page 52-61. ACM, (2004)Reflective Middleware: From Your Desk to Your Hand., , and . IEEE Distributed Systems Online, (2001)Security Challenges of Reconfigurable Devices in the Power Grid., , and . Critical Infrastructure Protection, volume 253 of IFIP, page 147-160. Springer, (2007)Addenda and Corrigenda: Formal Semantics of a Class of High-Level Primitives for Coordinating Concurrent Processes, and . Acta Inf., (1977)see: Acta Informatika 5: 297-332 (1975).Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut, , , , , and . CoRR, (2005)