Author of the publication

Non-intrusive, out-of-band and out-of-the-box systems monitoring in the cloud.

, , , , and . SIGMETRICS, page 249-261. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SnowFlock: rapid virtual machine cloning for cloud computing., , , , , , , and . EuroSys, page 1-12. ACM, (2009)Jettison: efficient idle desktop consolidation with partial VM migration., , , , , and . EuroSys, page 211-224. ACM, (2012)Low-bandwidth VM migration via opportunistic replay., , , and . HotMobile, page 74-79. ACM, (2008)Octopus: efficient data intensive computing on virtualized datacenters., , , , and . SYSTOR, page 3:1-3:11. ACM, (2013)A preliminary investigation of worm infections in a bluetooth environment., , , , , , , and . WORM, page 9-16. ACM Press, (2006)Context-aware interactive content adaptation., , , and . MobiSys, page 42-55. ACM, (2006)GSM indoor localization., , , , and . Pervasive Mob. Comput., 3 (6): 698-720 (2007)Proximity-based authentication of mobile devices., , , and . Int. J. Secur. Networks, 4 (1/2): 4-16 (2009)Scanning the literature.. ACM SIGMOBILE Mob. Comput. Commun. Rev., 8 (2): 1-2 (2004)Interactive Resource-Intensive Applications Made Easy., , , , and . Middleware, volume 4834 of Lecture Notes in Computer Science, page 143-163. Springer, (2007)